Content provided by Packet Pushers. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Packet Pushers or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App Go offline with the Player FM app!
America’s Sweethearts: Dallas Cowboys Cheerleaders is back for its second season! Kay Adams welcomes the women who assemble the squad, Kelli Finglass and Judy Trammell, to the Netflix Sports Club Podcast. They discuss the emotional rollercoaster of putting together the Dallas Cowboys Cheerleaders. Judy and Kelli open up about what it means to embrace flaws in the pursuit of perfection, how they identify that winning combo of stamina and wow factor, and what it’s like to see Thunderstruck go viral. Plus, the duo shares their hopes for the future of DCC beyond the field. Netflix Sports Club Podcast Correspondent Dani Klupenger also stops by to discuss the NBA Finals, basketball’s biggest moments with Michael Jordan and LeBron, and Kevin Durant’s international dominance. Dani and Kay detail the rise of Coco Gauff’s greatness and the most exciting storylines heading into Wimbledon. We want to hear from you! Leave us a voice message at www.speakpipe.com/NetflixSportsClub Find more from the Netflix Sports Club Podcast @NetflixSports on YouTube, TikTok, Instagram, Facebook, and X. You can catch Kay Adams @heykayadams and Dani Klupenger @daniklup on IG and X. Be sure to follow Kelli Finglass and Judy Trammel @kellifinglass and @dcc_judy on IG. Hosted by Kay Adams, the Netflix Sports Club Podcast is an all-access deep dive into the Netflix Sports universe! Each episode, Adams will speak with athletes, coaches, and a rotating cycle of familiar sports correspondents to talk about a recently released Netflix Sports series. The podcast will feature hot takes, deep analysis, games, and intimate conversations. Be sure to watch, listen, and subscribe to the Netflix Sports Club Podcast on YouTube, Spotify, Tudum, or wherever you get your podcasts. New episodes on Fridays every other week.…
Content provided by Packet Pushers. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Packet Pushers or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »
Content provided by Packet Pushers. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Packet Pushers or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »
Cisco recently announced a major evolution to its certification roadmap: starting February 2026, the popular DevNet certifications will transition to a brand-new Automation track. Joining us today is Francois Caen, Product Manager at Cisco, also an expert in network automation and a recognized voice in the Cisco Learning and Certification Community. We talk with Francois ... Read more »…
Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is ... Read more »…
Here we are, a bit more than halfway through the year. How’s your execution against your strategy going? Roiled by the economy? Disrupted by tariffs? Thrown off by staff retirements? If you built a proper technology strategy in the first place, driven by the business strategy, then no matter what is happening don’t ignore it, ... Read more »…
Take a Network Break! HPE and Juniper have settled with the US Department of Justice, allowing HPE’s $14 billion purchase to move forward. However, as part of the deal, Juniper must grant a full license to its AI Ops for Mist source code to one, or perhaps two, companies via an auction to be overseen ... Read more »…
The Cloud Gambit is joining the Packet Pushers network! Launched in 2023 as an independent podcast, The Cloud Gambit cuts through the hype to deliver what actually matters in cloud and AI. Hosts William Collins and Eyvonne Sharp decode the strategies, technologies, and market forces reshaping enterprise infrastructure. Built for engineers who lead, leaders who ... Read more »…
SNMP is still widely used in today’s networks. But modern telemetry and network observability are bringing changes to network monitoring. Today’s Heavy Networking is a roundtable discussion about alternatives to SNMP and real-world use cases for those alternatives. This episode was inspired by a request from listener Nikolay. He says… While telemetry (gRPC, etc.) is ... Read more »…
On today’s show we talk about NetDevOps and AI Ops with Greg Freeman, VP of Network and Customer Transformation at Lumen. Greg spearheads network automation, orchestration ,and AI strategy, guiding the highest technical tier in operations and championing NetDevOps methodologies. We talk about the people and work culture that’s influenced the development of automation and ... Read more »…
By popular request (and now that we have some other background topics covered) we start our series on the Open Shortest Path First (OSPF) routing protocol. We kick off the series with OSPF basics including Link State Advertisements, Link State Database, and other related essentials. We’ll explore additional OSPF topics over subsequent episodes. This week’s ... Read more »…
Today’s show is in memory of Fred Baker, who passed away on June 18, 2025. Fred was a pivotal figure in the IPv6 community. He was the long-time chair of the v6ops working group, and had a distinguished career at Cisco as a Technical Fellow. To honor Fred and his contributions, we’re sharing our interview ... Read more »…
MCP, or Model Context Protocol, is an open-source project originally created by Anthropic. MCP is designed to let AI agents to connect to data repositories, applications, business and developer tools, and other agents to execute tasks and carry out instructions. Day Two DevOps explores the capabilities and pitfalls of MCP, how the protocol works, and ... Read more »…
Take a Network Break! Our Red Alert is a remote code execution vulnerability in Roundcube. On the news front, HPE announces GreenLake Intelligence, which will bring agentic AI capabilities to the HPE portfolio, Pure Storage brings cloud-like operations for on-prem storage, and Juniper Networks adds predictive analytics to its data center ops platform. Weka rolls ... Read more »…
Today on the Tech Bytes podcast, sponsored by HPE, we get a preview of HPE Discover. We talk about networking, security, and agentic AI announcements coming out of the event. We’ll also talk about how HPE is converging network and security in its product portfolio, and HPE’s approach to AI both as a tool being ... Read more »…
Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access ... Read more »…
AI is already widely used for wireless network operations. On today’s show, we look at how AI and machine learning are also being applied to wireless design and site surveys. My guest is Jussi Kiviniemi, Founder and CEO of Hamina Wireless. We talk about how Hamina is developing and implementing AI tools to help designers ... Read more »…
Service provider networks face a couple of difficult challenges: how to map service level agreements to actual network health and performance, and how to deliver service assurance to customers regardless of what happens on the network. On today’s sponsored Heavy Networking we talk with Cisco Systems about its approach to service assurance, how Cisco is ... Read more »…
At AutoCon 3 in Prague, Scott Robohn sat down with Ernest Lefner from sponsor Gluware to talk about lessons learned throughout his career: from his early days of pulling cable to becoming Chief Product Officer at Gluware and helping to found ONUG. Ernest talks about being a continuous technology learner, and also about the need ... Read more »…
People consistently overestimate their ability to predict whether a new product or feature will be a success. Instead of blithely going forward with a project that takes up lots of resources and yields minimal results, today’s guest says we should get our ideas into contact with external reality as quickly as possible, and maybe do ... Read more »…
If you need to route in your network, you can program static routes into all your routing-capable devices. And this can work. But at some point, you’re probably going to want to switch to a dynamic routing protocol. On today’s N Is For Networking, Ethan and Holly discuss the differences between static and dynamic routes, ... Read more »…
On today’s show, we’re joined NetBox Labs co-founders Mark Coleman and Kris Beevers. They recount how they founded NetBox Labs and discuss its growth and how it’s being used. We also delve into the NetBox Labs community and its importance for users. And of course, there’s the ever-present AI discussion. Mark and Kris also talk ... Read more »…
Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for developers and ... Read more »…
IT teams deal with technology lifecycle issues all the time–including Y2K, which enterprises across the world grappled with for years. The Epochalypse, or Year 2038 Problem, is similar. Specifically, some Linux systems’ date-time counters will go from positive to negative at a specific date in 2038, potentially wreaking havoc on embedded systems and any other ... Read more »…
Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM, ... Read more »…
There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade, ... Read more »…
The Hexabuild team is providing a new community resource, an IPv6 compatibility checker, for those trying to figure out IPv6 network hardware and software compatibility. It’s currently in an alpha version. We talk about what inspired it, what it does, and possible future updates. We also want to get your feedback on whether this is ... Read more »…
Today we chat with Megaport’s Mitchell Warden, Founding Engineer; and Alexis Bertholf, Global Technical Evangelist, to find out what NetOps is like at Megaport, a company that provides scalable internet connections for all types of organizations. We look at the origins of Megaport and how the company started with the intention of network automation from ... Read more »…
What shape is your network? In other words, what is its topology? On today’s episode, we discover the different types of network topologies and designs used in the enterprise, data center, and service provider networks. We cover leaf/spine, hub and spoke, point to point, mesh, and others. We also talk about how topologies affect traffic ... Read more »…
Is WebAssembly the next big thing? Here to help us understand what WebAssembly (WASM) is and what it can and can’t do is Michael Levan, a consultant and WASM trainer. He also dives deeper into WASM details such as hosting, security, monitoring, and the ever-present influence of AI. AdSpot: Spacelift Founded by the creator of ... Read more »…
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electrical equipment ... Read more »…
A validation survey is typically used for wireless infrastructure post-installation. It compares predictions to real wireless network performance. On today’s show we chat with Joel Crane about validation survey controversies and the challenges of producing a survey whose data has integrity. We cover topics such as the perfectly green heat map, how fast you should ... Read more »…
Take a Network Break! We start with two critical vulnerabilities: one affecting cloud versions of Cisco ISE, and the other for HPE StoreOnce. In the news, Broadcom announces the Tomahawk 6 ASIC with 102.4Tbits of bandwidth, SentinelOne suffers a self-imposed network outage, and the Wireshark Foundation announces its first-ever professional certification for Wireshark. Cisco rebrands ... Read more »…
Network automation is today’s topic with sponsor Gluware. Gluware provides a network automation platform that targets both network engineers and automation builders. On today’s Heavy Networking, we discuss how Gluware supports these two constituencies. We also talk about a recent product announcement, Gluware Labs. Gluware Labs includes a free Community Edition of Gluware software you ... Read more »…
“Reinvent or die” is an apt adage for the ever-churning technology industry. Brad Maltz joins us to share his insights on what he calls “continuous reinvention” and how that relates to his own career and why others might want to adopt this mindset. Brad is a Senior Director of AI Solutions at Dell and has ... Read more »…
Let’s explore four goals of network design: stability, speed, scalability, and security. These goals are based on Ethan’s experience designing, building, and operating networks. Network architects and design experts might have other objectives, and that’s fine, but these four goals are the basis of today’s episode. Ethan and Holly discuss why these four goals are ... Read more »…
Firefly is a cloud infrastructure automation platform that helps cloud teams, DevOps, SRE, platform engineering, DevSecOps, and other groups manage their entire cloud as code. Firefly helps to manage cloud complexity and produce consistent and efficient cloud platforms with code. To help Firefly better understand their customers and industry trends around Infrastructure as Code (IaC), ... Read more »…
“There must be a better way!” is guest Bart Dorlandt’s motto, which he applies to network automation, among other things. In today’s episode, Bart shares what he’s learned about network automation, explains why he focuses on process over tools, and reflects on the importance of mentorship. Bart and Eric also discuss why even if listeners ... Read more »…
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero trust strategy, and the product landscape. Episode Links: ... Read more »…
You need someone to design your operations processes–or perhaps redesign them. That’s an Ops Architect. Should you take an ops person and train them up in architecture? Or an architect and train them up in operations? Do you even have that ops/engineer/architect organizational structure – and should you? Johna and John dive into this discussion ... Read more »…
Take a Network Break! We start with a Red Alert for the IBM Tivoli Monitoring Tool, which has an unpatched (as of recording time) vulnerability that could allow remote attackers to execute arbitrary code. On the news front, Salesforce ponies up $8 billion for Informatica to improve data governance capabilities, Google researchers revise estimates of ... Read more »…
Today on the Tech Bytes podcast, we talk about how to get more out of your NetFlow records with sponsor NetFlow Logic. NetFlow’s been around for a long time, and if you’re already including flow records as part of your monitoring and management arsenal, you may think you’re extracting all the value you can from ... Read more »…
If you participate in the public Internet by announcing your own netblocks, you should be familiar with Internet Routing Registries (IRRs) and the Routing Policy Specification Language (RPSL). These are tools that help you be a good network citizen. In a world of BGP hijacks and other problems, these tools matter more than ever. We ... Read more »…
Total Networks Operations sits down with Justin Ryburn for a wide-ranging discussion on the state of the networking industry. Topics including how to attract new talent to network engineering and network operations; getting literate in DevOps/infrastructure tools such as GitHub, Terraform, and Python; pairing Dev and NetOps to maximize domain expertise; integrating tools and trying ... Read more »…
Let’s chat about point-to-point links. On today’s episode we cover what should and shouldn’t be done, and discuss why following RFC’s doesn’t always get you to the right place. We dig into questions including: Don’t we just use link-local addresses for point-to-points? Shouldn’t we assign a /127, just like we do a /31 in IPv4? ... Read more »…
We wanted to do an episode on SD-WAN, but realized we needed to set the stage for how wide-area networking developed. That’s why today’s episode is a history lesson of the Wide Area Network (WAN). We talk about how WANs emerged, public and private WANs, how WANs connect to LANs and data centers, the care ... Read more »…
Ubiquiti is known primarily for wireless equipment for residential and small business use, but it can be a player in the enterprise world. On today’s show, we talk with Darrell DeRosia, Sr. Director, Network & Infrastructure Services with the Memphis Grizzlies, about how he provides that connectivity for the FedExForum, home to the Memphis Grizzlies ... Read more »…
Cloud networks aren’t like traditional data center networks, so applying a traditional network design to the cloud probably isn’t the best idea. On today’s Day Two Cloud, guest Aidan Finn guides us through significant differences between Microsoft Azure networking and on-prem data center networks. For instance, subnets don’t segment hosts, network security groups do; every ... Read more »…
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot ... Read more »…
Take a Network Break! We begin with a Red Alert for critical vulnerabilities Kubernetes Gardener. Up next, a threat actor has been squatting on unused CNAME records to distribute malware and spam, and IP Fabric rolls out a new firewall rule simulation capability to let administrators test the effect of firewall rules on traffic patterns. ... Read more »…
Netris is tackling the issue of automating multi-tenancy in an AI data center. Netris has your answer to this challenge, and it’s a solution certified to work with NVIDIA. We’re going to get into the nuts and bolts of Netris network automation with Alex Saroyan, CEO and co-founder of Netris. Along the way, we will ... Read more »…
Data Center construction has reached an incredible pace over the last few years with implications on NetOps and operations of all kinds. Today we with talk with sponsor Siemon regarding the state of data centers, past, present and future. We explore legacy data centers and how they are evolving to work in today’s environments. We ... Read more »…
On today’s episode, we are joined by Dr. Brad Topol, Distinguished Engineer and Director of Open Source Technologies at IBM, to talk about how to scale your leadership. We explore the process of how he went from individual contributor to distinguished engineer to director and executive. We chat about how you build a career ... Read more »…
On today’s show, we’re going to dig deeper into tunnels and explore some of the quirks and features of tunnels. This week we’ll discuss maximum transmission units (MTUs), maximum segment size, IP fragmentation and more. Today’s bonus material is more RFCs – RFC 4821 and RFC 8899. Episode Links: What Is a Tunnel? – N ... Read more »…
Damien Garros, CEO and co-founder of OpsMill is with us once again for today’s podcast. Since we last spoke with Damien, OpsMill has emerged from stealth mode and is making progress as one of the leaders in network source of truth in the field. Today, we’ll talk through the progress Infrahub has made and get ... Read more »…
Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan ... Read more »…
How far ahead should you plan, and what things belong in your strategic plan? Conventional wisdom holds that a 3-year planning horizon is “about right”–but in a period of rapid technical and geopolitical change (such as we’re arguably in right now) does that go too far out, particularly when agile methodologies recommend shorter action plans ... Read more »…
Take a Network Break! Guest co-host Tom Hollingsworth steps in for Johna Johnson. We start with Google patching a significant Chrome vulnerability and de-elevating Chrome running with admin rights when it launches on Windows. On the news front, we discuss a report, unconfirmed as of recording time, that Arista is acquiring VeloCloud, then discuss Broadcom ... Read more »…
AI is no longer on the horizon. It’s part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today’s Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that ... Read more »…
While studying for the CCIE Service Provider certification, Andrew Ohanian assembled a workbook to help him prepare. It’s packed with lab exercises, and Andrew has turned it into a free Web resource that anyone can access. On today’s Heavy Networking, we talk with Andrew about what’s in the guide, the state of the CCIE SP, ... Read more »…
Michael Costello shares his career journey on today’s Total Network Operations. Currently on the Board of Directors at NANOG and a Distinguished Engineer at Saviynt, Michael talks about his early days learning the ropes as a junior network engineer, trying to start an ISP, his stint in graduate school, and a very interesting role at ... Read more »…
Our IPv6 Basics series continues with link-local addresses. Link-local addresses are unicast addresses used for addressing on a single link. The intent of link-local addresses is to let devices that may not have a router or global unicast address allocation mechanism still be able to communicate on a network segment. On today’s show we dig ... Read more »…
Let’s dig into tunnels. While some network engineers may want to quibble, a tunnel is when you put one packet inside of another packet to carry it across a network (frames also come into the picture, so hold off on your follow-ups for now). On today’s N Is For Networking, Ethan and Holly explore this ... Read more »…
How do you measure developer performance and productivity? On today’s Day Two DevOps, we look at different methods with guest Laura Tacho, the CTO at DX. We explore industry benchmarks such as the DORA report, SPACE, and DevEx. Laura also introduces us to Core 4, a project she’s been working on that provides a new ... Read more »…
Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundation about ... Read more »…
Today on Heavy Wireless we welcome Francois Verges, who designed a database tool to help Wi-Fi engineers easily find client device capabilities. It provides quick access to key specs like data rates, Wi-Fi versions, and vendor documentation. It’s designed to be a go-to option when looking for Wi-Fi client specifications. We discuss why he developed ... Read more »…
Take a Network Break! We start with follow-up from a listener on the best way to listen to our podcast that helps the most. The answer? Any listen on any platform helps. Even better is to tell a friend! We discuss two critical security issues. First, CISA adds active exploits against known SonicWall vulnerabilities to ... Read more »…
SharkFest is the twice-yearly conference where Wireshark users and trainers gather to learn, share, and improve their packet and protocol analysis skills. The US version of SharkFest’25 is June 14 -19 in Richmond, VA. Gerald Combs of the Wireshark Foundation is here to tell us about why this live event needs to be on your ... Read more »…
On today’s Heavy Networking we talk with Dan Wade about testing the network, inspired by Dan’s talk at AutoCon 2: “Step 0: Test the Network.” We discuss why testing is a good idea, and then explore four types of network testing, including unit tests and integration tests. We dig into Yang, RESTCONF, NETCONF and gNMI ... Read more »…
Network monitoring, Internet monitoring, and observability are all key components of NetOps. We speak with sponsor Catchpoint to understand how Catchpoint can help network operators proactively identify and resolve issues before they impact customers. We discuss past and current network monitoring strategies and the challenges that operators face with both on-prem and cloud monitoring, along ... Read more »…
On this episode of Technically Leadership, we’re joined by Aleksandra Lemańska to learn about the Process Communication Model (PCM), a framework for enhancing communication. Alex calls PCM an algorithm for people, and it can be useful for improving interactions with engineers and technical folks operating in high-stress environments. We talk about how PCM works, understanding ... Read more »…
The Dynamic Host Configuration Protocol (DHCP) assigns an IP address to a host that joins a network, along with other information necessary for the host to communicate. DHCP also has more to it, so this week’s episode is meant to be a solid introduction to this essential network protocol. We first discuss what it is ... Read more »…
Today’s guest is Jeff Doyle, an expert in the networking industry with over 30 years of experience as a consultant, instructor, architect, author, and speaker. Eric chats with Jeff about his background and how he got into networking (spoiler: it was not a computer science degree!). The conversation explores Jeff’s current work and delves into ... Read more »…
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets ... Read more »…
It’s all well and good to develop a technology strategy, articulate and document the strategy, and agree (supposedly) on that strategy. But what do you do when one or more of the tech teams act in apparent opposition to the strategy? John and Johna discuss why this happens and what questions you need to ask ... Read more »…
Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise, ... Read more »…
On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a safe, ... Read more »…
Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to ... Read more »…
Today we talk with Tommy Jensen, a Senior Technical PM Strategist at Microsoft, about IPv6 support in Windows. Tommy shares what he hears from enterprises that are moving toward IPv6-mostly, strategies for dealing with older applications and devices that expect IPv4, and how the customer conversations he’s having about IPv6 now are more engaged and ... Read more »…
This week we continue with DNS. In our last episode we covered the basics; today we expand our scope to cover topics such as security for DNS, reverse DNS, and DNS record types. For dessert this week, a serving of Raspberry Pi and Happy Eyeballs. Episode Links: DNS: Turning Names into Numbers – N Is ... Read more »…
The shine has been coming off public cloud for awhile. Cloud costs remain high, complexity is growing, and public cloud interoperability is difficult. And while there’s talk about moving back to private cloud, that migration presents its own costs and complexities. To help us navigate the challenge that is cloud in 2025, we welcome Mark ... Read more »…
Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to travel hundreds ... Read more »…
AI can impact an enterprise in several ways: making individuals more productive, making products and services more effective, and making it easier for customers and partners to do business. IT plays a critical role in enabling AI to have these impacts. On today’s sponsored Heavy Strategy, Cisco CIO Fletcher Previn explains how to locate AI use ... Read more »…
Today on Heavy Wireless we welcome Jerry Olla to give us details from his talk “Roaming Wars: How Wi-Fi Devices Handle 2.4, 5, and 6 GHz”. Jerry tested the roaming behavior of popular Wi-Fi clients across 2.4, 5, and 6 GHz. He explains his testing protocol and results, and answers questions such as whether tri-band ... Read more »…
Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate ... Read more »…
Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for ... Read more »…
Model Context Protocol (MCP) is a very new protocol that provides a standard way to link AI models to a variety of data sources and tools. As the industry heads toward agentic AI–in which an AI agent interacts with disparate applications, data sources, and other agents to achieve a task–MCP provides the protocol glue. On ... Read more »…
On this episode of Technically Leadership, Chris Leonard joins to talk about the costs of intervention in a team discussion, whether that’s to bring a team back to a topic or to make a decision that needs to be made. We discuss hero culture (both in the team and as the leader), imposter syndrome, and ... Read more »…
The Domain Name System (DNS) keeps the Internet running. On today’s N Is For Networking podcast, we talk about how DNS transforms human-readable host names into IP addresses so that Internet traffic can be sent to the right place. We talk about root name servers, Top Level Domains (TLDs), and other elements of the DNS ... Read more »…
Today we explore the current state of network automation with Chris Grundemann, a co-founder of Network Automation Forum. Chris gives the history of the Network Automation Forum and AutoCon conference, which aims to blend technology and community. He shares ideas for advancing network automation, and invites other network engineers to participate in shaping the future ... Read more »…
Working with multiple Infrastructure as Code (IAC) tools can be painful. Spacelift provides a platform that operates on top of disparate IaC tools, including Ansible, Kubernetes, Pulumi, Terraform, and OpenTofu. Spacelift helps build the automation with and between these tools, creating graphs of graphs that make your dependencies just work. On today’s show, we talk ... Read more »…
Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs ... Read more »…
Most organizations have a long list of security holes in the form of unpatched systems and other known but unresolved vulnerabilities. Is it time to hit the big PAUSE button and fix, patch, or mitigate all of that before we resume deploying new systems (and their accompanying risks)? Join us as we tear into whether ... Read more »…
Take a Network Break! We start with a red alert for the CVE program, which nearly lost government funding before CISA stepped in, and then raise an alert for a Dpanel vulnerability. Google makes its Cloud WAN available to enterprises and governments that want connectivity options, a US District Court rules Google’s ad business a ... Read more »…
Today on the Tech Bytes podcast we’re talking AI readiness with sponsor Broadcom. More specifically, getting your network observability ready to support AI operations. This isn’t just a hardware or software issue. It’s also a data issue. We’ll get some tips with our guest Jeremy Rossbach. Jeremy is Chief Technical Evangelist and Lead Product Marketing ... Read more »…
Knowing the flow of how a packet gets from one end to the other is one of the most important pieces of advice given by today’s guest, Mark Prosser. He shares his journey in the IT industry, his thoughts on Ops vs. design, and the differences between working in a telco NOC and the enterprise ... Read more »…
What if there was an simple way to test software and services to see if they work in a variety of IPv6 environments, including v6-only, dual-stack, and others? That’s the goal of the IPv6 Test Pod Project. This project provides a device, at no cost to the applicant, that comes with a variety of v6 ... Read more »…
Today’s Heavy Networking is all about overlay technologies, their history, development, and current state, both from engineer and vendor perspectives. We discuss why the industry turns to overlays to solve problems, and look at overlay and segmentation approaches including VXLAN, SRv6, and EVPN. We also drill into the idea that EVPN could become the standard ... Read more »…
Following last week’s introduction to network monitoring, we discuss the Simple Network Management Protocol (SNMP), one of the most implemented types of network monitoring. We discuss how it is organized, operations that SNMP can perform, and versions of SNMP. This week’s bonus conversation is a discussion on the future for SNMP. Episode Links: MIB tree ... Read more »…
Data and what you do with it is the topic of today’s show with guest Dominic Chapman, the Head of Product at Axiom. Dominic’s career focus is on data, how to store and how to operationalize all the data that different technology stacks create. We talk with Dominic about how the data does not lie, ... Read more »…
If you’ve been looking for an interactive chart to visualize the Wi-Fi spectrum, look no further than guest Joel Crane’s spectrum viewer. With the spectrum visualizer, you can pan across the spectrum, zoom in and out, and select specific regulatory domains. Joel shares his inspiration for the project and how he accomplished it with a ... Read more »…
We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to ... Read more »…
Nokia Event-Driven Automation (EDA) is a modern infrastructure automation platform that combines speed with reliability and simplicity. It makes data center network automation more trustable and easier to use, from small edge clouds to the largest AI fabrics. Today on Tech Bytes, we talk with Sam Arora from Nokia for more details about some of ... Read more »…
Take a Network Break! Guest co-host Ned Bellavance steps in for Johna this week. We start with a Fortinet vulnerability, and then opine on a memo from Shopify’s CEO on the company requiring and measuring AI use by employees. Git celebrates 20 years, DARPA names 15 companies to participate in a Quantum Benchmarking Initiative to ... Read more »…
Network security has evolved from stateful perimeter firewalls with maybe some IDS/IPS to a complex stack delivered as numerous unique tools, which often don’t talk to one another and may need to be operated by specialists. In this environment it’s hard to unify a security policy, troubleshoot problems, manage and operate tools, and respond effectively ... Read more »…
On today’s show, we introduce Aviz Networks with Vishal Shukla, Co-Founder & CEO. Vishal and Aviz are making Networks for AI, and AI for Networks. Vishal explains how Aviz does this by offering AI Networking Unpacked. Designed for open-source and vendor-agnostic networking, AI Networking Unpacked works with existing network infrastructures. It also integrates with existing ... Read more »…
On today’s episode we’re joined by Daniel Ward to get a sneak preview of his talk on Getting the Entire Team to Speak, which he’ll give at DevOpsDay Austin. His addresses the challenges of getting people to speak up. Why is this needed? Getting input from everyone on a team lets people raise issues and ... Read more »…
How do you know what is happening within your network, especially when something isn’t working? Network monitoring is the answer. On today’s show, we’ll start with the basics of network monitoring. We’ll cover what it is, how it’s used, and suggest some paid and open source network monitoring tools. This week’s bonus material is a ... Read more »…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.