
The Everything Feed - All Packet Pushers Pods
1,774 episodes — Page 17 of 36
HN731: GraphQL: Open Source Query Language for APIs
What if instead of sending multiple queries out to APIs and getting disparate data back, you could just send a single query and receive a single answer. That’s exactly what GraphQL does for you. Rick Donato joins the show today to teach us about GraphQL and how it can help us on the path to... Read more »
NAN061: Transforming Network Telemetry Into Operational Insights With Kentik (Sponsored)
The expectations for application delivery are higher than ever before, the networks that support those applications are increasingly distributed, and visibility is essential for network operations and troubleshooting. On today’s sponsored episode, Kentik’s Phil Gervasi joins us to discuss how Kentik collects essential performance data to help you monitor and manage all the networks your... Read more »
D2C241: Choose Your Own Adventure: Manager, Director, or IC
What makes for a good manager, director, and independent contributor (IC), and how do you figure out which is the best fit for you? Hazel Weakly has had a whirlwind tour of all three and is ready to share her insight into each. We talk about the skill set needed for each, and figuring out... Read more »
PP011: IoT Protocols: Detection and Protection
IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing... Read more »
HS070: Living on the Edge: The Present Future of Edge Architecture
Right now we’re in the first generation of edge architecture. We won’t even really know how to define it until we’re past it. Greg and Johna discuss the operational milieu in which the edge is forming: Vast numbers of IoT devices, increased remote computing capabilities, questions around cloud operational costs and efficiency, and vendors jostling... Read more »
NB475: Cisco Hypes Hypershield; Broadcom Tries To Clarify VMware Strategy
Take a Network Break! This week we cover Hypershield, a new Cisco security product that uses technology from its Isovalent acquisition. We parse a blog from Broadcom CEO Hock Tan on the company’s VMware strategy, and discuss China’s latest counter-punch in its tech infrastructure fight with the United States. A KPMG survey reveals that executives... Read more »
Tech Bytes: Begin Your Unified SASE Journey with Next-Gen SD-WAN (Sponsored)
Secure Access Service Edge, or SASE, combines SD-WAN with cloud-delivered security services including next-gen firewall, CASB, secure web gateway, and others. You can mix and match your SD-WAN and cloud security, but today Rajesh Kari from Palo Alto Networks is here to advocate for the benefits of their single-vendor option. We talk performance, security, and... Read more »
HN730: Retail, Healthcare, Manufacturing and More Transform Their Branches with Next-Gen SD-WAN and SASE (Sponsored)
If you haven’t made the leap from traditional wide area networking to SD-WAN, or perhaps you’re thinking about adding security services to your SD-WAN infrastructure, this episode is for you. Rajesh Kari from Palo Alto Networks joins the show to share customer stories from the front lines of multi-branch businesses’ networks. Industry verticals including retail,... Read more »
IPB149: A Progress Report on the Federal Government’s IPv6 Migration
When you chair the IPv6 Task Force for the United States Federal Government, you get a pretty good view of IPv6 implementation across the world and in every aspect of American society. That’s why we have Rob Sears on the show today. He gives us his perspective as chair of the task force charged with... Read more »
Day Two Cloud: The Duality of Enterprise AI
Welcome to a crossover episode with the Day Two Cloud podcast! AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to... Read more »
D2C240: The Duality of Enterprise AI
AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to give their takes on enterprise AI. Johna brings with her the... Read more »
NAN060: Python for Network Engineering with Kirk Byers (Part 2)
This is Part 2 of Kirk Byers’ interview. We discuss the Git course he’s developing and the need to build bridges between networking and testing so we can move automation forward. This of course leads us to geek out about AutoCon and the talks we’re most excited about. Plus, Kirk shares his wisdom about creating... Read more »
PP010: CISA’s Cyber Incident Reporting Law: What You Need to Know
The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical Infrastructure Act.” We break down the details, including what kind of companies the law applies to, what it defines as an “incident,” and... Read more »
HW025: Easy as Pi: The WLAN Pro’s Swiss Army Knife
In 2016, a handful of wireless engineers got together and decided to create the portable tool they all wish existed. Thus the WLAN Pi was born. Jerry Olla, Nick Turner, and Jiri Brejcha join the show today to talk about the evolution of the open source WLAN Pi and its current capabilities. The latest generation... Read more »
NB474: Intel Strikes Back In GPU Wars; The Fork Is Strong With Valkey
Take a Network Break! This week we start with some FU on Intel drivers, and how FISA affects people outside (and inside) the US. In the news we cover Intel’s rollout of new XPU silicon and associated software as it tries to make up ground against Nvidia’s AI dominance, Zscaler’s acquisition of a microsegmentation startup... Read more »
Tech Bytes: Building an Effective Security Platform with Fortinet (Sponsored)
There’s a lot of well-earned criticism of security platforms: They’re a tangle of acquired products, packaged so you pay for more than you need, sucking you into a single vendor. Today John Maddison from Fortinet explains why their security platform is different. Fortinet has one unified fabric with a single operating system, agent, and management... Read more »
HN729: Open Source to Closed
With “The Cathedral and the Bazaar” as his guide, Srivats launched Ostinato, his open source project, in 2010. He needed an affordable network traffic generator at his day job, he was passionate enough to build one during his nights and weekends, and end users loved it– it has been downloaded hundreds of thousands of times.... Read more »
D2C239: “(Almost) Every Infrastructure Decision I Endorse or Regret”
You can’t just drop a knife on fish and expect there to be sushi. Jack Lindamood joins us today to share his metaphors and thoughts on picking the right IT tools and processes as outlined in his popular article, “(Almost) Every Infrastructure Decision I Endorse or Regret after 4 Years Running Infrastructure at a Startup.”... Read more »
HS069: Regulating AI
In today’s episode Greg and Johna spar over how, when, and why to regulate AI. Does early regulation lead to bad regulation? Does late regulation lead to a situation beyond democratic control? Comparing nascent regulation efforts in the EU, UK, and US, they analyze socio-legal principles like privacy and distributed liability. Most importantly, Johna drives... Read more »
PP009: Don’t Forget the Firmware
If your approach to firmware is that you don’t bother it as long as it doesn’t bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and for good reason: Attackers are targeting firmware because compromising this software can allow attackers to persist on systems after... Read more »
NB473: Duty To Report (Your Breaches); Intel Foundry Biz Loses $7 Billion
Take a Network Break! This week we start with some FU on Juniper’s Mist AI, the ConnectWise vulnerability, and the 25th anniversary of the Cisco Cat6. The US Cybersecurity & Infrastructure Security Agency (CISA) has proposed new rules that require organizations to report security incidents within 72 hours and ransomware payments within 24 hours. Intel... Read more »
HN728: How Drivenets Leverages Ethernet Fabrics For AI Networking (Sponsored)
To run AI workloads, a network needs thousands of GPUs and those GPUs must operate in sync. If there is congestion or dropped frames, very expensive efforts could be delayed or disrupted. While there are advantages to using Ethernet for AI networking (including engineers well-trained in the protocol and a robust ecosystem), it wasn’t designed... Read more »
IPB148: Microsoft to Expand CLAT Support in Windows 11
Today Tom, Scott, and Ed discuss the exciting announcement in IPv6 world: Microsoft is expanding its CLAT support in Windows 11. This means enterprises can be even more comfortable transitioning to a IPv6-only network: Now not only do they have DNS64 and NAT64 to translate IPv4 to IPv6, but they have CLAT for any apps... Read more »
NAN059: Python for Network Engineering with Kirk Byers (Part 1)
The intersection of Python and network engineering is Kirk Byers’ sweet spot. Today, the creator of the Netmiko library and core maintainer of NAPALM joins the show to tell us about his network automation journey. We also discuss Kirk’s experience on the business side of things, both the ups and downs. This is Part 1... Read more »
PP008: Dishin’ Up Cloud SLAW (Security Lab A Week)
Learning cloud security can be daunting for experienced network engineers, much less complete newbies. That’s why Rich Mogull started “Cloud Security Lab A Week,” aka Cloud SLAW. Every Thursday, he emails subscribers a new hands-on lab, building a full enterprise deployment week-by-week, step-by-step. Rich explains all the details to JJ and Drew including the cost... Read more »
HW024: Find Your People on the Wi-Fi Pros Slack
Today we talk to Sam Clements, founder of Wi-Fi Pros Slack. This online community has 1,600 members who share information and technical tips, talk shop, and connect with peers. Sam tells us how he developed the community over time, how he structures topics and channels, the ongoing fight against bots and spam, and where it... Read more »
Tech Bytes: Simplifying Network Deployment & Operations With Nile (Sponsored)
Today Austin Hawthorne from Nile joins us to dig into the company’s Network as a Service (NaaS) approach and how it differentiates from traditional networking solutions. Nile aims to streamline network deployment and operations by providing a complete network service: It performs the site survey, provides the switches and access points, brings the gear on... Read more »
NB472: HPE Adds GenAI to Aruba Central; Intel Eager to Slurp Billions in Subsidies
Take a Network Break! This week we try to peel back the layers on HPE’s announcement about new GenAI capabilties in Aruba Networking Central, parse Broadcom’s touting of its AI credentials, and feel conflicted about Intel sucking up billions in taxpayer dollars. South Korean chipmaker SK Hynix dangles a $4 billion investment promise to the... Read more »
HN727: Kubernetes Networking Essentials
Where there are containers, there is networking. Today we dig into the networking that underlies Kubernetes, the open source orchestration platform for container-based applications. Our guest Karim El Jamali takes us through the essential concepts: Nodes, pods, clusters, CNIs, virtual ethernet pairs, ingress controller, eBPF, and service meshes. As container-based applications grow in popularity, it’s... Read more »
D2C238: Tech Hiring is Borked
Life isn’t easy for someone looking for a job in tech. There are lots of content mills pushing the idea that if you just pass this one six-month course, you’ll have a six-figure career in no time. There are lots of hiring companies who make job applicants jump through a ton of hoops, but often... Read more »
Packet Protector: IPv6 Security Essentials
Welcome to a crossover episode with the Packet Protector podcast! You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So... Read more »
PP007: IPv6 Security Essentials
You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So let’s stop trying to disable it whack-a-mole style, and start... Read more »
Tech Bytes: How SR Linux Lets You Take Control Of Your Data Center (Sponsored)
On today’s Tech Bytes, we explore SR Linux, the network operating system developed by today’s sponsor Nokia. Why should you care about the network OS running in your data center? Nokia designed SR Linux to support automation, orchestration, and customization. We’ll dig into SR Linux’s support for YANG and gNMI and how that ties into... Read more »
NB471: Nvidia Unveils 800G Ethernet, InfiniBand Switches For AI Fabrics; ‘Ghost Jobs’ Haunt Job Boards
Take a Network Break! Nvidia announces new 800G switches, one for Ethernet and one for InfiniBand, for building AI fabrics. Nvidia also announces an “AI supercomputer,” a rack-scale pre-built bundle of Nvidia GPUs and CPUs connected via InfiniBand switches. The NaaS startup Meter announces new campus switches and what it calls a “digital twin” capability,... Read more »
HW023: The Best of WLPC 2024 Phoenix
The Wireless LAN Professionals organization just had its 10th annual conference and who better to break it down than WLPC founder (and Heavy Wireless host) Keith Parsons and friend of the show Ferney Munoz. They review their favorite presentations as well as heartwarming moments. Episode Guest Ferney Munoz | Ekahau and CWNP Certified Wireless Network... Read more »
HN726: From Automation to Orchestration for a FinTech Network (Sponsored)
Fiserv is one of the largest payment processors in the world, In 2023 it handled more than 35 billion transactions worth $2.03 trillion US dollars. Its network is critical to the business. The organization knew it needed network automation, but early attempts got some things wrong. On today’s Heavy Networking we talk about how Fiserv... Read more »
IPB147: The Network Engineering Advantages of IPv6
For years, Johannes Weber has heard network engineers around the world repeat the myth that IPv6 is more of a hassle than IPv4. So he made a list: “Why IPv6 is better than IPv4.” Don’t worry, solving global address exhaustion isn’t on it. In this episode, Johannes goes over his list with precision and passion... Read more »
D2C237: Managing Medical IoT Devices on AWS
In this podcast episode, Randy Horton from Orthogonal and Ian Sutcliffe from AWS discuss the complexities of supporting regulated medical devices in the cloud. They explore the challenges of adhering to regulations, the importance of security, and the need for robust frameworks. The conversation highlights the non-prescriptive nature of regulations, encouraging best practices rather than... Read more »
NAN058: The Story of containerlab with Roman Dodin (Part 2)
Welcome back for Part 2 of Eric’s interview with Roman Dodin, co-creator of containerlab. Roman describes containerlab as a “lab as code” tool that quickly and easily creates virtual networking topologies. With increased automation and containerization in network engineering, the tool’s popularity has exploded. We talk about how folks contribute to containerlab’s development and what... Read more »
HS068: What’s the Point of Having a Tech Strategy?
What does having a tech strategy actually do for an organization? In today’s episode, Greg and Johna highlight how a good tech strategy benefits a company: creates a foundation of first principles, reduces bias in vendor decisions, better allocates human resources, kills bad ideas, sunsets projects, and makes meetings a little more enjoyable and harmonious.... Read more »
PP006: Effective Security for Small IT Shops
This episode is for IT professionals who work in small- to medium-sized businesses and are expected to handle cybersecurity on top of issues like “my camera isn’t working on Zoom.” Guest Joe Stern has been filling this role for an 80-person company for almost 30 years. We talk about how he prioritizes risks, security tools... Read more »
Tech Bytes: Protecting Connected Medical Devices With Palo Alto Networks IoT Security (Sponsored)
Medical devices are an essential element of patient care. They’re also network-connected devices that need resilient connectivity and security. On today’s Tech Bytes we examine the challenges of supporting and securing connected medical devices, including threats, vulnerabilities, and regulatory frameworks. We’ll also discuss strategies and best practices to manage medical device risks and ensure the... Read more »
NB470: NetBox Labs Adds On-Prem Support; ASML Vs. The Netherlands
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network testing space with... Read more »
HN725: Standing up a DC Network Using Terraform
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and... Read more »
NAN057: Nile Incorporates Network Automation from the Ground Up (Sponsored)
What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »
PP005: Red, Blue, Purple: Choosing the Right Teams for Security Testing and Defense
According to Bryson Bort, you can build higher metaphorical fences, electrify them, and have sharks with laser beams prowling the moat, but attackers are still going to get through the security perimeter. That’s why the priority of any IT team should be to identify anomalies and anticipate attack logic. To do this, organizations need to... Read more »
Tech Bytes: Cisco ThousandEyes Deepens Visibility for Remote Workforce Management (Sponsored)
SecOps, NetOps, and help desks need integrated data, increased context, and the ability to quickly understand interdependencies in order to take on the complex tasks facing them. That’s why ThousandEyes is now integrated with Cisco Secure Access, Cisco’s SSE solution. Tune in to learn about ThousandEyes’ deeper visibility, system process metrics, streamlined test setup, and... Read more »
NB 469: Arista Debuts Network Observability Service; Startups Aim To Break Nvidia’s AI Chip Grip
This week we discuss a new network observability offering from Arista that integrates network telemetry with application data, why startups such as Groq and Taalas think they can break Nvidia’s grip on the AI chip market, and how Microsoft is hedging its LLM bets. Amazon goes nuclear with the purchase of a reactor-powered data center... Read more »
HN724: How Packets Move Through a Network Device
Today we metaphorically pop open the hood of switches and routers, taking a look at the mechanics of how they work. We cover the three states: configuration, operational, and forwarding. We talk RIB and FIB, along with CAM, TCAM, and MPLS. We also cover line rate, port-to-port latency, and buffers. Whether it’s been awhile since... Read more »
IPB146: The Basics of IPv6 Addressing
If you’ve been wondering about the double colons and letters you’re seeing in IPv6 addresses, this is the episode for you. Tom and Scott break down IPv6 addressing, starting with the basics of binary and taking you all the way through the etiquette of not using capital letters in Layer 3 addressing (we’re looking at... Read more »