Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
The Packet Pushers Podcast Network includes a lot of smart listeners. Sometimes, they want to try podcasting. This is where those new podcast ideas hatch! Have a listen to the voice of the IT community.
…
continue reading
1
TL006: From Blame to Empowerment: Changing Team Culture in Tech
46:02
46:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
46:02
Leadership has a huge impact on an organization’s culture, including tech teams. On the positive side, leaders can foster healthy, productive environments. On the negative side, they can build hostile, blame-centric viper pits. Today’s episode of Technically Leadership examines how to strive for the positive by shielding teams from internal politic…
…
continue reading
1
HN757: Building a DIY SD-WAN to Serve (Very) Remote Customers
49:29
49:29
나중에 재생
나중에 재생
리스트
좋아요
좋아요
49:29
On today’s episode, we chat with wireless ISP engineer Elijah Zeida. Elijah had an interesting connectivity challenge to solve for a remote mountain town that relies on a wireless connection for Internet access, and not much budget to solve it with. But he got it done by building his own SD-WAN using Mikrotik boxes and... Read more »…
…
continue reading
Everyone has their own hot take or bit of wisdom to share regarding technical leadership. Today, host Laura Santamaria weaves these insights on communication, collaboration, decision making and more from her guests on the first six episodes of Technically Leadership. Listen, reflect and then apply to your own leadership role. Episode Links: Laura S…
…
continue reading
1
NAN078: The Evolution of Ostinato: From Open Source to a Sustainable Business
44:58
44:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
44:58
Ostinato is a network traffic generator aimed at network engineers who need test traffic, whether in a lab or production, to do things such as test circuit bandwidth, determine if SD-WAN or load balancing rules are working as intended, investigate packet drops, and more. Originally released as an open-source project, Ostinato is now offered as... R…
…
continue reading
1
D2DO256: Alkira’s Universal Transit: Simplifying Hybrid & Multi-Cloud Networks (Sponsored)
39:15
39:15
나중에 재생
나중에 재생
리스트
좋아요
좋아요
39:15
We are firmly entrenched in a hybrid cloud world, from on-prem data centers to multiple cloud platforms to branch and remote offices, not to mention wandering end users connecting via VPN. While the network is the common substrate among all these locations, every cloud provider has its own network implementation. Managing, monitoring and securing a…
…
continue reading
Security professionals often have an impulse to want to move on to the next new thing. While that can be helpful in a field that thrives on change, it can also make it hard to focus on routine tasks and mundane (yet essential) security controls and practices. Whether this impulse is due to varying degrees... Read more »…
…
continue reading
Analysis paralysis is a huge problem in IT – we “study” and “evaluate” and “keep on our radar” but then all too often have a choice and a need to act thrust upon us, and need to switch modes fast. How do we try to get more mileage out of the studying to get leverage... Read more »저자 Packet Pushers
…
continue reading
1
NB502: AWS Revenue Growth Lags Cloud Competitors; Microsoft Entra ID Forces MFA
25:37
25:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
25:37
Take a Network Break! This week we discuss Google adding traffic shaping to its cross-cloud interconnect, Aviatrix bringing hybrid cloud transit to its cloud networking service, and Microsoft forcing MFA for Entra ID customers. Microsoft CEO Satya Nadella forgoes $5 million in incentive pay for Microsoft security lapses, Extreme Networks adds new f…
…
continue reading
1
HN756: Alkira Enhances Its Multi-Cloud Networking With ZTNA and Security (Sponsored)
47:04
47:04
나중에 재생
나중에 재생
리스트
좋아요
좋아요
47:04
Alkira provides a Multi-Cloud Networking Service (MCNS) that lets you connect public cloud and on-prem locations using a cloud-delivered, as-a-service approach. But Alkira offers more than just multi-cloud connectivity. On today’s sponsored episode of Heavy Networking, we dig into Alkira’s full set of offerings, which include networking, visibility…
…
continue reading
1
TNO007: Good Foundations Are Key To Leveraging AI for Network Operations
56:00
56:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
56:00
In this episode of Total Network Operations the conversation focuses on the impact and implementation of AI on network operations. Host Scott Robohn is joined by guest Michael Wynston to discuss the foundational requirements for AI implementation, such as well-documented processes, version control, and lab testing. Michael also talks about the need…
…
continue reading
1
TNO007: Good Foundations Are Key To Leveraging AI for Network Operations
56:00
56:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
56:00
In this episode of Total Network Operations the conversation focuses on the impact and implementation of AI on network operations. Host Scott Robohn is joined by guest Michael Wynston to discuss the foundational requirements for AI implementation, such as well-documented processes, version control, and lab testing. Michael also talks about the need…
…
continue reading
If you’re going to use DHCPv6, you have options, but there are some things you need to know in order to be able to build out your DHCPv6 configuration properly. Today’s IPv6 Buzz explores similarities and differences between DHCP and DHCPv6, particularly the operational model. And as always, you’ll want to verify and test before... Read more »…
…
continue reading
1
D2DO255: Is AI the Magic Solution for Refactoring Legacy Code?
37:58
37:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:58
AI is being integrated and adopted across much of the IT world, but can it work magic in transforming old legacy code into shiny modern code? When it comes to this magic trick, it’s important to look behind the curtain. On today’s Day Two DevOps podcast we discuss the reality of AI in refactoring code... Read more »…
…
continue reading
What is a private mobile network and how does it work? Guest Jeremy Rollinson, an expert in private cellular networks, joins host Keith Parsons to clarify misconceptions about private mobile networks, from terminology to spectrum allocations. They explore the differences between public and private networks, the evolution of private mobile networks,…
…
continue reading
1
HS087: Alkira’s Multi-Cloud NaaS Bridges Networking and Security (Sponsored)
35:21
35:21
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:21
Startup Alkira has built a Network as a Service (NaaS) offering that extends from on prem to public cloud and multi-cloud. Today’s sponsored episode of Heavy Strategy digs in to Alkira’s capabilities in multi-cloud networking, security, automation, and cost transparency. Guest Manan Shah, SVP of Product at Alkira, explains how Alkira simplifies net…
…
continue reading
1
PP037: From Supply Chain Security to Post-Quantum Cryptography – Live from XFD!
30:47
30:47
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:47
This episode was recorded live at Security Field Day (XFD) 12 in October, 2024. As delegates at the event, JJ and Drew heard presentations from DigiCert, Dell Technologies, SonicWall, and Citrix. These presentations covered topics including digital certificate management, post-quantum cryptography, supply chain security, recovering from ransomware,…
…
continue reading
1
NB501: Fortinet, Cisco Defects Being Exploited; FCC Wants Input on ISP Data Caps
23:37
23:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:37
Take a Network Break! This week we discuss a new ZTNA offering from NaaS startup Alkira, a serious vulnerability in Fortinet’s management software under active exploit, and a less-serious vulnerability in Cisco security software that’s also being exploited. Gluware adds new AI copilots to its network automation software, a judge orders Broadcom to …
…
continue reading
1
HN755: Optimizing Ethernet to Meet AI Infrastructure Demands
1:09:49
1:09:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:09:49
Ethernet competes with InfiniBand as a network fabric for AI workloads such as model training. One issue is that AI jobs don’t tolerate latency, drops, and retransmits. In other words, AI workloads do best with a lossless network. And while Ethernet has kept up with increasing demands to support greater bandwidth and throughput, it was... Read more…
…
continue reading
1
NAN077: Network Observability: Tools, Automation, and Insights
47:42
47:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
47:42
Network optimization starts with observing, but how are networks observed and what tools are used? Joining the podcast today are the authors behind the book “Modern Network Observability.” Eric Chou welcomes David Flores, Christian Adell, and Josh VanDeraa to help uncover practical strategies and real-world case studies for network observability. E…
…
continue reading
1
D2DO254: Intelligent Data Infrastructure: How NetApp Builds for Performance, Security, and Visibility across Clouds (Sponsored)
35:06
35:06
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:06
Enterprise data is everywhere: on prem, at the edge, and across the public cloud. Storing and managing that data involves more than just SSDs and spinning disks; it’s about building and operating a data infrastructure. On today’s Day Two DevOps podcast, host Ned Bellavance explores the idea of data infrastructure with Jeff Baxter, VP of... Read mor…
…
continue reading
1
PP036: News Roundup – NIST Nixes Password Resets, Cargo Crane Espionage Risks, Municipal Govs Targeted, and More
34:05
34:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:05
Today’s Packet Protector rounds up recent security news, including revised password guidelines from NIST, a White House push to help fill infosec jobs, and potential espionage risks from Chinese-made cranes being used at US ports. We also cover a hospital data breach that leaked nude patient photos, discuss why municipal governments are rich target…
…
continue reading
In this episode, John and Johna share the findings from the recent [Next] conference that most inspired them: How to project-manage an 18-year effort to put a drone on Titan, why AI algorithms need to consider the factor of time, how to train robots, and why effective storytelling is an essential tool in a technology... Read more »…
…
continue reading
1
NB500: SolarWinds and MacOS Vulernabilities Get Attention; Amazon Invests in Nuclear to Meet Power, Carbon Goals
32:24
32:24
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:24
This week’s Network Break discusses a CISA warning that a serious SolarWinds vulnerability is being exploited, Microsoft turns the tables by discovering a MacOS vulnerability, and Amazon invests in small modular nuclear reactors to meet growing power demands and reduce carbon output. T-Mobile releases a new device using the 5G Reduced Capacity spec…
…
continue reading
1
Tech Bytes: From AWS Topography to On-Prem Flows, Cisco ThousandEyes Boosts Network Visibility (Sponsored)
14:36
14:36
나중에 재생
나중에 재생
리스트
좋아요
좋아요
14:36
The Tech Bytes podcast welcomes back sponsor Cisco ThousandEyes to talk about new features that improve visibility into both the public cloud and your on-prem network. We’ll get details on the new topographical mapping feature for AWS, as well as ThousandEyes’ new capability to consume flow records from on prem and correlate those records with... R…
…
continue reading
1
HN754: Secure AI by Design with Palo Alto Networks (Sponsored)
52:37
52:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
52:37
AI is finding its way into more and more consumer and business applications. In particular, the widespread use of Generative AI raises a serious question: how secure is it? In this sponsored Heavy Networking episode we discuss security risks of AI tools and ways to mitigate those risks. Our guest is guest Rich Campagna, Senior... Read more »…
…
continue reading
Join Mike Bushong, an industry expert, and host Scott Robohn as they talk about why Network Operations is the next big thing and why you should start with the end in mind for NetOps. Their proposal is that NetOps shouldn’t just get a seat at the table; they should get 51% of the vote. They... Read more »…
…
continue reading
Join Mike Bushong, an industry expert, and host Scott Robohn as they talk about why Network Operations is the next big thing and why you should start with the end in mind for NetOps. Their proposal is that NetOps shouldn’t just get a seat at the table; they should get 51% of the vote. They... Read more »…
…
continue reading
IPv6 address provisioning is the topic of this latest installment of the IPv6 Basics series. The hosts focus on Stateless Address Auto Configuration (SLAAC) and Dynamic Host Configuration Protocol for IPv6 (DHCPv6). The differences between SLAAC and DHCPv6 are explained, including their use cases, the complexities of address management, and the imp…
…
continue reading
1
D2DO253: Breaking Into Tech: Job Hunting Realities for Recent Graduates
45:46
45:46
나중에 재생
나중에 재생
리스트
좋아요
좋아요
45:46
Job hunting is never easy and on today’s Day Two Cloud, Katrina Janeczko shares her journey from college to her current role at Comcast. Katrina discusses the challenges of job hunting, the relevance of her education, and the impact of AI tools on her learning process. She also talks about the importance of networking, mentorship,... Read more »…
…
continue reading
1
HW038: From Coax to Fiber: Wi-Fi Evolution in Multiple Dwelling Units (MDUs)
23:56
23:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:56
Todd Thorpe is today’s guest on Heavy Wireless joining host Keith Parsons to explain the evolution of Wi-Fi technology in Multiple Dwelling Units (MDUs) like apartments and condos. Todd, with over 20 years of MDU experience, discusses the industry’s transformation from early coax cable services to modern managed Wi-Fi solutions. The challenges of r…
…
continue reading
1
NAN076: Innovating Healthcare IT: Automating NetOps at RUSH University Medical Center (Sponsored)
41:56
41:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:56
Uzair Khan from RUSH University Medical Center is today’s guest on the Network Automation Nerds podcast. Uzair discusses the complexities of healthcare technology and the critical role of automation in enhancing operational efficiency and patient safety. He provides examples of how Itential’s automation and orchestration products have given his tea…
…
continue reading
1
PP035: What IT Should Know About Securing Industrial Systems
47:31
47:31
나중에 재생
나중에 재생
리스트
좋아요
좋아요
47:31
Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers, need to become familiar with the operational challenges and quirks of ICS/OT systems. On today’s Packet Protector, guest Mike Holcomb demystifies ICS a…
…
continue reading
1
NB499: Juniper Extending AI Umbrella to Security; Should We Regulate AI or AI Outcomes?
28:55
28:55
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:55
Take a Network Break! This week we cover a new Juniper announcement and discuss how the company is bringing its security portfolio under its AI umbrella, Aryaka adding CASB to its SASE menu, and whether the FTC’s prescriptive security requirements for Marriott will actually lead to better security. Cisco invests in a GPU-as-a-Service startup, steal…
…
continue reading
1
HN753: Getting to Know Cisco’s Network Service Orchestrator (NSO)
1:08:37
1:08:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:08:37
On today’s episode, guest James Henderson joins the Packet Pushers to discuss Cisco’s Network Service Orchestrator (NSO). NSO’s role in network automation, its declarative management approach, and the challenges it presents are some of the things James shares with the hosts. They also cover operational requirements, deployment challenges, and perfo…
…
continue reading
1
TNO005: Making Networking Cool Again with Meter (Sponsored)
37:03
37:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:03
Meter CEO Anil Varanasi joins Scott Robohn on this sponsored episode of Total Network Operations to talk about Meter’s vision for networking and network operations. In this podcast, recorded the day before Meter’s first public MeterUp event, Anil and Scott discuss Meter’s approach to building new networking equipment, vertical integration of their …
…
continue reading
1
TNO005: Making Networking Cool Again with Meter (Sponsored)
37:03
37:03
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:03
Meter CEO Anil Varanasi joins Scott Robohn on this sponsored episode of Total Network Operations to talk about Meter’s vision for networking and network operations. In this podcast, recorded the day before Meter’s first public MeterUp event, Anil and Scott discuss Meter’s approach to building new networking equipment, vertical integration of their …
…
continue reading
1
TL005: Navigating the Practical and Emotional Challenges of Tech Layoffs
21:35
21:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:35
Layoffs are a sensitive topic in the tech industry. Host Laura Santamaria discusses the emotional and practical impacts on employees and leaders. She also covers the signs of potential layoffs, and strategies for job searching post-layoff while maintaining perspective. She concludes with a tips for leaders to more effectively lead their teams throu…
…
continue reading
1
NAN075: Mastering Networking in the Age of AI: Advice for Aspiring Engineers
1:01:24
1:01:24
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:01:24
Ivan Pepelnjak joins host Eric Chou to reflect on his extensive career, his decision to reduce his content creation, and offer advice for young engineers. They discuss the evolution of networking technologies, emphasizing the importance of mastering Linux and obtaining relevant certifications. Ivan highlights the significance of creating profession…
…
continue reading
1
PP034: Driving Security and Network Assurance with Juniper Networks (Sponsored)
37:04
37:04
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:04
Today on the Packet Protector podcast we talk with sponsor Juniper Networks about how to simplify the complexity that affects network and cybersecurity teams alike. From tool sprawl to floods of data, complexity bedevils operations and troubleshooting. We talk about what Juniper brings to the table for networking and security professionals to help …
…
continue reading
Don’t let the perfect be the enemy of the good… it’s a challenge that architects and strategists often face. They may design a “perfect” architecture or strategy, only to see it overwhelmed by the realities of implementation. John Burke and Johna Johnson discuss the questions to ask to ensure that devotion to the perfect doesn’t... Read more »…
…
continue reading
1
NB498: BlueCat Flows Into Network Performance With LiveAction Buy; T-Mobile Ordered to Appoint a CISO
25:42
25:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
25:42
Take a Network Break! DDI specialist BlueCat is getting into network performance monitoring with its LiveAction acquisition, T-Mobile is ordered to spend almost $16 million to improve its infosec practices and get a CISO, and Cisco announced the end of life for its LoRaWAN IoT product line. Verizon recovers from a US-wide outage, security researche…
…
continue reading
1
HN752: How Digital Twins Enable Smarter Network Ops, Troubleshooting (Sponsored)
57:49
57:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
57:49
Our topic today is digital twins. Sponsor Forward Networks offers software that creates a “mathematically accurate” copy of your network, be it on prem or in the cloud. We talk about what “mathematically accurate” actually means, and how a digital twin can support network operations including change control, network automation, visibility, and trou…
…
continue reading
Guest Tom McGonagle, the creator of GitNops, is back with host Scott Robohn for part two of their GitNops discussion. They continue their conversation about the principles and applications of GitNops in network operations, including automated testing, the collaborative role of GitHub, and the challenges of ensuring accurate configurations before de…
…
continue reading
Guest Tom McGonagle, the creator of GitNops, is back with host Scott Robohn for part two of their GitNops discussion. They continue their conversation about the principles and applications of GitNops in network operations, including automated testing, the collaborative role of GitHub, and the challenges of ensuring accurate configurations before de…
…
continue reading
In this episode we discuss the complexities of deploying IPv6 on a compressed timeline. We cover the need for careful planning, training, and understanding the protocol’s nuances. The conversation looks at the risks of delaying deployment, the benefits of incremental implementation, and the global momentum towards IPv6 adoption. Misconceptions abou…
…
continue reading
1
D2DO252: (Re)Building Cloudflare’s Millions-of-Logs-Per-Second Logging Pipeline
37:53
37:53
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:53
Cloudflare’s transition from SysLog-NG to OpenTelemetry is the topic of discussion on this episode of Day Two DevOps. Guests Colin Douch and Jayson Cena from Cloudflare explain the reasons behind the migration, including the need for better scalability, memory safety, and maintainability. They delve into challenges such as ensuring uninterrupted cu…
…
continue reading
1
HW037: Is Wi-Fi 7 the Game Changer We’ve Been Waiting For?
25:55
25:55
나중에 재생
나중에 재생
리스트
좋아요
좋아요
25:55
Wi-Fi 7 brings new features and capabilities to the market, including Multi-Link Operation (MLO) and airtime optimization, which can enhance throughput and reduce latency. In today’s episode of Heavy Wireless, host Keith Parsons and guest Phil Morgan explore the advancements and practical implications of Wi-Fi 7. Phil shares his experiences testing…
…
continue reading
The terms “AI” and “machine learning (ML)” get thrown around pretty regularly in IT and cybersecurity. On today’s Packet Protector we get an introduction to AI and ML to help you ask the right questions when vendors tout their latest AI-infused products. Our guest is Jeff Crume, a distinguished engineer and cybersecurity architect at IBM.... Read m…
…
continue reading
Cisco CIO Fletcher Previn visits Heavy Strategy to talk about how to create a technology culture, what it’s like being “customer zero”, and other challenges and tribulations of running IT from inside one of the world’s largest tech companies. Episode Guest: Fletcher Previn, SVP & Chief Information Officer, Cisco Fletcher Previn has over two decades…
…
continue reading
1
NB497: Blocking AI Scraper Bots; HPE, Arista Reach for Bigger Slices of the Enterprise
39:34
39:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
39:34
Take a Network Break! This week we discuss significant vulnerabilities in HPE APs and Cisco Catalyst 9K switches, the benefits of bug bounties, how HPE is adding third-party device monitoring to Aruba Central, and whether Arista can succeed at positioning CloudVision as a management platform for enterprise data center, campus, and WAN environments.…
…
continue reading