The Everything Feed - All Packet Pushers Pods - podcast cover

The Everything Feed - All Packet Pushers Pods

Packet Pusherspacketpushers.net
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.

Episodes

TNO016: One Integrated Experience for NetOps, SecOps, and Business Teams (Sponsored)

Collaboration among tech and business teams is crucial to advancing your business. Extreme Networks is introducing Extreme Platform ONE to support this collaboration. In this sponsored episode, we talk about how this product is designed to streamline workflows and enhance user experience through automation and AI integration. Extreme Networks Platform ONE is a centralized platform ... Read more »...

Feb 14, 202543 minTranscript available on Metacast

N4N013: Spanning Tree Part 1 – An Introduction and Broadcast Storms

Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network. ... Read more »...

Feb 13, 202553 minTranscript available on Metacast

NAN085: Embrace Change to Thrive in the Tech Industry

Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning ... Read more »...

Feb 12, 20251 hrTranscript available on Metacast

PP049: CSMM – A Practical Model for Improving Your Cloud Security

The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process ... Read more »...

Feb 11, 202543 minTranscript available on Metacast

HS094: How Risky Is Your Organization’s AI Strategy?

AI Large Language Models (LLMs) can be used to generate output that the creators and users of those models didn’t intend; for example, harassment, instructions on how to make a bomb, or facilitating cybercrime. Researchers have created the HarmBench framework to measure how easily an AI can be weaponized. Recently these researchers trumpeted the finding ... Read more »...

Feb 11, 202525 minTranscript available on Metacast

NB513: UK Demands Apple Backdoor; AI Spending: Can’t Stop, Won’t Stop

Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with ... Read more »...

Feb 10, 202539 minTranscript available on Metacast

Tech Bytes: When the Internet Is Your Network, Catchpoint IPM Provides Critical Visibility (Sponsored)

Today on the Tech Bytes podcast we dive into Digital Experience Monitoring and Internet Performance Monitoring with sponsor Catchpoint. As more users rely on SaaS and cloud for applications, the Internet has essentially become a business-critical network. But how can you, a network engineer, be expected to manage the Internet? Enter Internet Performance Monitoring, or ... Read more »...

Feb 10, 202516 minTranscript available on Metacast

HN767: Effective Networking on the Cheap

Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how ... Read more »...

Feb 07, 20251 hr 10 minTranscript available on Metacast

TNO015: Revolutionizing Telecom with NetOps Automation and Collaboration

Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while ... Read more »...

Feb 07, 20251 hrTranscript available on Metacast

IPB168: Deploying IPv6-Only Wi-Fi at the SC24 Conference

Want to know how an IPv6-only wireless network was deployed at a conference with 18,000 attendees? Join us as we talk through the technical details with Tom Costello, a senior network engineer at Argonne National Laboratory. Tom volunteers at the International Conference for High Performance Computing, Networking, Storage and Analysis (SC for short) to help ... Read more »...

Feb 06, 202534 minTranscript available on Metacast

N4N012: Russ White On Why We Need Network Models

Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered ... Read more »...

Feb 06, 202549 minTranscript available on Metacast

D2DO264: Serverless Goes Mainstream

Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits ... Read more »...

Feb 05, 202539 minTranscript available on Metacast

PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More

JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack ... Read more »...

Feb 04, 202539 minTranscript available on Metacast

HW045: A Comprehensive Guide to Wi-Fi Explorer Pro 3: Features, Insights, and More!

Wi-Fi Explorer Pro is a popular wireless scanner. On today’s show we dive into the tool with its creator, Adrian Granados. We also talk about the launch of the new book Wi-Fi Explorer Pro 3 – The Definitive User Guide, written by Granados and co-author Nigel Bowden. We delve into the history and features of ... Read more »...

Feb 04, 202527 minTranscript available on Metacast

NB512: US Objects to HPE-Juniper Wedding; Cheeky DeepSeek Freaks VCs

Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN market gets ... Read more »...

Feb 03, 202530 minTranscript available on Metacast

HN 766: Ensuring QoE for Agentic AI With Broadcom VeloRAIN (Sponsored)

On today’s show, we’re discussing the complexities of network design for AI computing at the edge. We’re not talking about AIOps, although that might come up in this conversation. Instead, we’re focusing on how to effectively cope with the network traffic patterns happening on your network as a result of AI computing workloads. Our subject ... Read more »...

Jan 31, 202555 minTranscript available on Metacast

TNO014: Beneath the Cable Color – A Look at The Siemon Company’s High Speed Cable Assemblies (Sponsored)

Today we get an education on what a high speed cable assembly really is from guest Ryan Harris from today’s sponsor, The Siemon Company. Ryan shares the evolution of high-speed pluggable cable assemblies from 64kbps ISDN B channels to 800 gigabit connections, and describes how they work. We discuss the Siemon Company’s history and its ... Read more »...

Jan 31, 202544 minTranscript available on Metacast

N4N011: What’s the Difference Between LAG, MLAG, MC-LAG, and Stacking?

In today’s episode, we address listener Kieren’s question about the differences between LAG, MLAG, MC-LAG, and stacking. We tackle the nuances of Link Aggregation (LAG) and the Link Aggregation Control Protocol (LACP), and explain their roles in redundancy and bandwidth efficiency. We also discuss the complexities and differences among vendors and overall benefits of Multi-Chassis ... Read more »...

Jan 30, 202556 minTranscript available on Metacast

NAN084: From GitNops Zero to Hero

Are you ready to go from zero to hero in GitNops? On today’s podcast, we talk with Tom McGonagle, who shares and explains git, CI/CD and DevOps and how that all fits into network engineering. The conversation also covers the evolution of containerization and Kubernetes, highlighting their roles in modern network automation. Tom also encourages ... Read more »...

Jan 29, 202545 minTranscript available on Metacast

PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit

Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, particularly in threat hunting ... Read more »...

Jan 28, 202543 minTranscript available on Metacast

NB511: Cisco Sells Security Blanket for AI Nightmares; Stratoshark Captures System Calls

Take a Network Break! We start with critical vulnerabilities affecting the Android OS, Cisco Meeting Management, and SonicWall, and then discuss a report that tens of thousands of Fortinet security appliances still haven’t been patched despite active exploits. Palo Alto Networks releases an open API to make it easier for developers to access Quantum Random ... Read more »...

Jan 28, 202538 minTranscript available on Metacast

HS093: Strategic Trust-Building Among Ops, Engineering, Architecture – and Leadership

Billy Joel had it right: It’s a matter of trust. Too often Operations, Engineering, and Architecture teams don’t trust one another–and nobody trusts leadership (and vice versa!). Special guest (and PacketPushers host) Scott Robohn joins us to talk about how to build trust, and the special role of an Operations Architect. Episode Guest: Scott Robohn, ... Read more »...

Jan 28, 202536 minTranscript available on Metacast

HW044: Unpacking NETGEAR’s Enterprise Wireless and Wired Portfolio (Sponsored)

NETGEAR is known for consumer networking products, but it also offers a robust porfolio of wireless and wired networking products designed for the enterprise. On today’s Heavy Wireless, sponsored by NETGEAR, we take a close look at the hardware, software, and services that NETGEAR offers to enterprise customers. That includes Wi-Fi 7 APs, a full ... Read more »...

Jan 28, 202526 minTranscript available on Metacast

Tech Bytes: Unifying Cloud, On-Prem Security with Lacework FortiCNAPP (Sponsored)

CNAPP, or Cloud Native Application Protection Platform, is an integrated suite of tools for cloud-native apps that aims to help organizations manage cloud app risks and identify and respond to threats. Today on the Tech Bytes podcast we talk with sponsor Fortinet about its Lacework FortiCNAPP offering and how it integrates CNAPP for unified security ... Read more »...

Jan 27, 202518 minTranscript available on Metacast

HN765: Telecom In the Bahamas: Lessons In Resiliency

Many of us have had network design discussions relating to natural disasters. What if a fire comes through? Or a flood? For most of us, those discussions don’t feel overly worthy of our attention. Yes, we should think about it. Yes, we should plan for it. If we’re really serious, we’ll even dust off the ... Read more »...

Jan 24, 202553 minTranscript available on Metacast

TNO013: How Do We Apply DevOps to Traditional Networking?

Can we map DevOps principles and practices to network operations? Should we? On today’s show, we talk with Williams Collins and Eyvonne Sharp to understand DevOps both culturally and practically. We also discuss the challenges of applying DevOps to network operations. We look at lightweight options such as starting small, having a centralized source of ... Read more »...

Jan 24, 202539 minTranscript available on Metacast

IPB167: Crossing the 50% IPv6 Adoption Threshold

IPv6 adoption should cross 50% in 2025. In today’s podcast, we discuss the implications and significance of IPv6 adoption reaching this milestone. While this transition might not be visible to average users, it does impact IT professionals. We explore varying adoption rates across industries, and talk about compliance requirements will soon necessitate IPv6. We also ... Read more »...

Jan 23, 202522 minTranscript available on Metacast

N4N010: Why Was the Colon Chosen as a Delimiter in IPv6?

It’s history day on N Is For Networking! We learn about the development of IPv6 directly from Bob Hinden, one of the pioneers who made it happen. Bob discusses his journey from early work on ARPANET to his significant contributions to IPv6. We also cover the transition from IPv4, the challenges faced during IPv6’s creation, ... Read more »...

Jan 23, 202550 minTranscript available on Metacast

NAN083: Cox Gets Network Automation Right, and Proves It at DEF CON (Sponsored)

Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and challenges in ... Read more »...

Jan 22, 20251 hr 1 minTranscript available on Metacast

D2DO263: An Anthropologist’s Advice for Improving IT Cultures

It’s tempting to run IT organizations the same way we run infrastructure: as resource units to be applied to various jobs. But people aren’t infrastructure. They have opinions. They form teams. They operate on different incentives, which sometimes clash within an organization (i.e. sales vs. product managers, or infosec vs. everybody). Today’s guest, Lianne Potter, ... Read more »...

Jan 22, 202545 minTranscript available on Metacast