
The Everything Feed - All Packet Pushers Pods
1,774 episodes — Page 11 of 36
Tech Bytes: How Internet Synthetic Transactions Boost App Performance Visibility (Sponsored)
Today on the Tech Bytes podcast we talk about Internet Performance Monitoring, or IPM, with sponsor Catchpoint. Catchpoint provides visibility across the full Internet Stack to help you understand the performance of your SaaS and cloud apps, WAN and branch connections, and more. We’ll talk about how Catchpoint can enrich network monitoring with synthetic transactions... Read more »
NB517: TSMC Pledges $165 Billion for US Chip Manufacturing; Will the CHIPS Act Get Axed?
Take a Network Break! This week we’re joined by guest analyst Tom Hollingsworth of The Futurum Group. We start with red alerts from Broadcom on multiple vulnerabilities and an emergency patch from Cisco for its Webex platform. In tech news we discuss SolarWinds’ acquisition of Squadcast and how it fits into the SolarWinds portfolio, Aviatrix’s... Read more »
HN771: Is The CCIE Still Worth It In 2025?
The CCIE remains the gold standard for networking certifications. But these days there are lots of other avenues for developing your skills and advancing your networking career, including network automation, cloud networking, and yes, even AI. So is the CCIE still worth it? We chew on this topic with Eman Conde. Eman has been known... Read more »
TNO019: A Look At NetOps Inside a Colocation Facility
Ever wonder what network operations are like inside a colocation facility? Today we talk with Scott Brookshire, CTO of OpenColo. Scott shares his journey into networking, how OpenColo was founded, and the evolution of the company from a few servers to a significant data center operation. We delve into what it means to run a... Read more »
IPB170: RFC 7050 vs RFC 8781 for IPv6 Prefix Discovery
In this episode of the IPv6 Buzz, we dive into two RFCs for discovering IPv6 prefixes: 7050 and 8781. Why these two? First, 8781 is being proposed as preferential to 7050. Second, co-host Nick Buraglio is an author on 8781 and has insights to share. We start with some background on RFC 7050, including the... Read more »
N4N016: Routers Are Not Switches…Are They?
The line between switches and routers can get a little blurry. On today’s N Is For Networking, we try to clear things up. We start by defining what a router and switch are, and then provide some historical and technical context to better understand the differences. Then we discuss how modern switches have evolved to... Read more »
D2DO266: How AI Affects the Developer Experience
Let’s talk about how AI affects the developer experience, particularly for open source tools such as Terraform. We’re joined by guests Welly Siauw and Tyler Lynch to examine a project that leverages AI to automate the generation of documentation and examples for AWS Terraform providers. We delve into the iterative development process with AI, the... Read more »
PP052: The State of the Network Security Market In 2025
How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a... Read more »
HW047: Diverse Career Paths In the Wi-Fi Industry
There are multiple avenues into a career in Wi-Fi. Today on Heavy Wireless, we explore different career paths with guests Sam Clements and Tauni Odia. Sam shares his unconventional journey from working at a gas station to becoming a Wi-Fi networking professional. He emphasizes the value of certifications and seizing opportunities. Tauni, with a background... Read more »
NB516: Cisco, Nvidia ASIC Deal Chases Enterprise AI; Juniper Welcomes Third-Party LLMs
Take a Network Break! This week we start with a couple of follow-ups and a Red Alert, and then jump into tech news. Cisco and Nvidia team up to put Cisco ASICs and the Nexus NOS into Nvidia Ethernet switches, the market reads tea leaves as Microsoft walks away from data center capacity, and Juniper... Read more »
HN770: Deploying A Global Network in Minutes With Megaport (Sponsored)
In our conversation today with CTO Cameron Daniel of Megaport, we discuss their global WAN architecture, PoPs, use cases, the Megaport Cloud Router, and more. Megaport is our sponsor today. It’s accurate to describe Megaport as providing Network-as-a-Service. Megaport’s automated connectivity solutions enable rapid provisioning of circuits, contrasting sharply with traditional telcos. The discussion also... Read more »
N4N015: Spanning Tree Part 3 – Versions, States and Guards
We’re back with the third and last (for now) installment of our spanning tree series. Today’s episode includes an explanation of spanning tree versions, 802.1D, 802.1w, 802.1s, and their practical implications for network design. The discussion then turns to BPDU guard for preventing loops and ensuring rapid connectivity. Bonus material on why you should or... Read more »
TNO018: The Network Engineer’s Evolution: Thinking Like a Product Owner (Sponsored)
What does it mean for a network engineer to develop a product mindset? And what does a product mindset have to do with network automation? Guest Peter Sprygada connects these concepts in today’s episode of Total Network Operations, sponsored by Itential. Peter says that as an organization advances its network automation capabilities, the impetus shifts... Read more »
NAN086: A Reality Check On AI for Network Operations
On today’s episode, we get a reality check on all the hype surrounding AI with guest Phil Gervasi. Phil provides background on Large Language Models (LLMs) and their applications, as well as the current state of AI technology. We also delve into practical use cases for AI in network operations, from AI as an assistant... Read more »
PP051: Security Certifications From Beginner to Advanced
Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan... Read more »
HS096: Corporate Foresight and How to Get It
Someone needs to be scanning the horizon for the threats and opportunities that are distant for now–and they need to be able to turn that foresight into action. We welcome John Miranda of Intel for a lively discussion of how to look ahead, how to get folks to pay attention to the alerts you raise,... Read more »
NB515: Quantum Computing’s Future Looking More Certain; Arista Posts Record 2024 Revenues
Lots of good stuff in this week’s Network Break. Microsoft announces an 8-qubit quantum chip and declares that practical quantum computing is years, not decades, away. D-Wave says its quantum computers are now commercially available for research facilities, academic institutions, and governments. Apple rolls its own 5G modem into its iPhone 16e. Meta announces its... Read more »
HN769: CI/CD Pipelines and Network Automation
Continuous Integration / Continuous Deployment (CI/CD) is a framework that developers use to help them manage and integrate frequent code changes. As network automation evolves, should network engineers adopt CI/CD? Guest Tony Bourke joins us to talk about CI/CD pipelines: what they are, how they’re used, and how they can support network automation efforts. We... Read more »
TNO017: Lead People, Manage Machines and Processes
Lead people. Manage machines and processes. That’s the the advice from Bill Hunter, today’s guest on Total Network Operations. Bill shares lessons of resilience and adaptability he learned early in his career, including the power of good habits. Bill and Scott discuss how to identify processes that can be automated and when and where to... Read more »
IPB169: 10 Years of the UK IPv6 Council
IPv6 Buzz welcomes back Veronika McKillop, the founder and President of the UK IPv6 Council, to talk about the council’s formation and achievements in the past ten years. We look at IPv6 adoption in the UK and its challenges, and what the future holds for IPv6. Veronika highlights the need for improved IPv6 education in... Read more »
N4N014: Spanning Tree Part 2 – Root Bridge, Edge Port, Forwarding and Blocking
Welcome to part 2 of our spanning tree series. We start with a quick review and then discuss root bridges, root ports, designated ports, and forwarding and blocked ports. We explain the impact of topology changes on spanning tree and network performance, and discuss how topology changes and convergence events are communicated. Last but not... Read more »
D2DO265: How Do We Measure Developer Experience?
Developer experience is a hard metric to measure qualitatively. On today’s show, we talk with Kristen Foster-Marks about Developer Experience, or DevEx. We start with the controversial concept of “ghost engineering,” which claims many software engineers do not contribute meaningfully to their work. We delve into the validity of this claim, and discuss the scientific... Read more »
PP050: Understanding–and Protecting Yourself From–the Malware Economy
There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and the most effective strategies... Read more »
HW046: The Flipper Zero: A Swiss Army Knife for Tech Enthusiasts
The Flipper Zero is like a Swiss Army knife for wireless tech enthusiasts. Today’s guest, Jason Beshara, is teaching a course on the Flipper Zero device at WLPC Phoenix 2025. He discusses its functions, including its ability to send and receive a variety of radio signals including Bluetooth, NFC, and sub-gigahertz frequencies. The conversation covers... Read more »
Tech Bytes: Nokia Event-Driven Automation: Simple, Reliable Data Center Automation (Sponsored)
Nokia’s Event-Driven Automation, or EDA, is a network automation platform that aims to help network engineers achieve predictable, error-free operations so you can keep up with all the change tickets coming your way while ensuring the data center is reliable and performant. On today’s Tech Bytes podcast, sponsored by Nokia, we’ll talk about how EDA... Read more »
NB514: Cisco, Juniper Announce New Switches; SolarWinds Goes Private in $4.4 Billion Buyout
Take a Network Break! We start with some Red Alert vulnerabilities to get your blood pumping, and then dive into networking news. Cisco announces new data center switches with AMD Pensando DPUs that let you deploy security and other services directly on to the switch. Cisco ThousandEyes is previewing Traffic Insights, which correlates flow records... Read more »
HS095: The Journey to a Self-Healing Network: Intelligence, Agents, and Complexity (Sponsored)
Can AI and automation create a truly autonomous network, one that’s self-diagnosing and self-healing? Join Vitria CTO and Founder Dale Skeen and industry analyst Charlotte Patrick in this sponsored episode of Heavy Strategy to discuss the challenges–and limitations–of using AI to create autonomous networking. This discussion covers the “intelligence architecture” required to implement automation, and ... Read more »
HN768: Ctrl+Alt+Delivered App Routing Reinvented with Palo Alto Networks SD-WAN (Sponsored)
Connecting your branch to your wide area network used to be simple enough. Call your carrier, get a circuit ordered, wait a long time, then turn it up. A little routing, and there you were. Cloud blew that model apart. Now when we connect branches to our corporate networks, we have to consider not only... Read more »
TNO016: One Integrated Experience for NetOps, SecOps, and Business Teams (Sponsored)
Collaboration among tech and business teams is crucial to advancing your business. Extreme Networks is introducing Extreme Platform ONE to support this collaboration. In this sponsored episode, we talk about how this product is designed to streamline workflows and enhance user experience through automation and AI integration. Extreme Networks Platform ONE is a centralized platform... Read more »
N4N013: Spanning Tree Part 1 – An Introduction and Broadcast Storms
Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network.... Read more »
NAN085: Embrace Change to Thrive in the Tech Industry
Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning... Read more »
PP049: CSMM – A Practical Model for Improving Your Cloud Security
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process... Read more »
HS094: How Risky Is Your Organization’s AI Strategy?
AI Large Language Models (LLMs) can be used to generate output that the creators and users of those models didn’t intend; for example, harassment, instructions on how to make a bomb, or facilitating cybercrime. Researchers have created the HarmBench framework to measure how easily an AI can be weaponized. Recently these researchers trumpeted the finding... Read more »
NB513: UK Demands Apple Backdoor; AI Spending: Can’t Stop, Won’t Stop
Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with... Read more »
Tech Bytes: When the Internet Is Your Network, Catchpoint IPM Provides Critical Visibility (Sponsored)
Today on the Tech Bytes podcast we dive into Digital Experience Monitoring and Internet Performance Monitoring with sponsor Catchpoint. As more users rely on SaaS and cloud for applications, the Internet has essentially become a business-critical network. But how can you, a network engineer, be expected to manage the Internet? Enter Internet Performance Monitoring, or... Read more »
HN767: Effective Networking on the Cheap
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how... Read more »
TNO015: Revolutionizing Telecom with NetOps Automation and Collaboration
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while... Read more »
IPB168: Deploying IPv6-Only Wi-Fi at the SC24 Conference
Want to know how an IPv6-only wireless network was deployed at a conference with 18,000 attendees? Join us as we talk through the technical details with Tom Costello, a senior network engineer at Argonne National Laboratory. Tom volunteers at the International Conference for High Performance Computing, Networking, Storage and Analysis (SC for short) to help... Read more »
N4N012: Russ White On Why We Need Network Models
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered... Read more »
D2DO264: Serverless Goes Mainstream
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits... Read more »
PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »
HW045: A Comprehensive Guide to Wi-Fi Explorer Pro 3: Features, Insights, and More!
Wi-Fi Explorer Pro is a popular wireless scanner. On today’s show we dive into the tool with its creator, Adrian Granados. We also talk about the launch of the new book Wi-Fi Explorer Pro 3 – The Definitive User Guide, written by Granados and co-author Nigel Bowden. We delve into the history and features of... Read more »
NB512: US Objects to HPE-Juniper Wedding; Cheeky DeepSeek Freaks VCs
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN market gets... Read more »
HN 766: Ensuring QoE for Agentic AI With Broadcom VeloRAIN (Sponsored)
On today’s show, we’re discussing the complexities of network design for AI computing at the edge. We’re not talking about AIOps, although that might come up in this conversation. Instead, we’re focusing on how to effectively cope with the network traffic patterns happening on your network as a result of AI computing workloads. Our subject... Read more »
TNO014: Beneath the Cable Color – A Look at The Siemon Company’s High Speed Cable Assemblies (Sponsored)
Today we get an education on what a high speed cable assembly really is from guest Ryan Harris from today’s sponsor, The Siemon Company. Ryan shares the evolution of high-speed pluggable cable assemblies from 64kbps ISDN B channels to 800 gigabit connections, and describes how they work. We discuss the Siemon Company’s history and its... Read more »
N4N011: What’s the Difference Between LAG, MLAG, MC-LAG, and Stacking?
In today’s episode, we address listener Kieren’s question about the differences between LAG, MLAG, MC-LAG, and stacking. We tackle the nuances of Link Aggregation (LAG) and the Link Aggregation Control Protocol (LACP), and explain their roles in redundancy and bandwidth efficiency. We also discuss the complexities and differences among vendors and overall benefits of Multi-Chassis... Read more »
NAN084: From GitNops Zero to Hero
Are you ready to go from zero to hero in GitNops? On today’s podcast, we talk with Tom McGonagle, who shares and explains git, CI/CD and DevOps and how that all fits into network engineering. The conversation also covers the evolution of containerization and Kubernetes, highlighting their roles in modern network automation. Tom also encourages... Read more »
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, particularly in threat hunting... Read more »
NB511: Cisco Sells Security Blanket for AI Nightmares; Stratoshark Captures System Calls
Take a Network Break! We start with critical vulnerabilities affecting the Android OS, Cisco Meeting Management, and SonicWall, and then discuss a report that tens of thousands of Fortinet security appliances still haven’t been patched despite active exploits. Palo Alto Networks releases an open API to make it easier for developers to access Quantum Random... Read more »
HS093: Strategic Trust-Building Among Ops, Engineering, Architecture – and Leadership
Billy Joel had it right: It’s a matter of trust. Too often Operations, Engineering, and Architecture teams don’t trust one another–and nobody trusts leadership (and vice versa!). Special guest (and PacketPushers host) Scott Robohn joins us to talk about how to build trust, and the special role of an Operations Architect. Episode Guest: Scott Robohn, ... Read more »