Lead people. Manage machines and processes. That’s the the advice from Bill Hunter, today’s guest on Total Network Operations. Bill shares lessons of resilience and adaptability he learned early in his career, including the power of good habits. Bill and Scott discuss how to identify processes that can be automated and when and where to ... Read more »
Feb 21, 2025•44 min
Welcome to part 2 of our spanning tree series. We start with a quick review and then discuss root bridges, root ports, designated ports, and forwarding and blocked ports. We explain the impact of topology changes on spanning tree and network performance, and discuss how topology changes and convergence events are communicated. Last but not ... Read more »...
Feb 20, 2025•35 min
Developer experience is a hard metric to measure qualitatively. On today’s show, we talk with Kristen Foster-Marks about Developer Experience, or DevEx. We start with the controversial concept of “ghost engineering,” which claims many software engineers do not contribute meaningfully to their work. We delve into the validity of this claim, and discuss the scientific ... Read more »
Feb 19, 2025•40 min
There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and the most effective strategies ... Read more »...
Feb 18, 2025•43 min
Take a Network Break! We start with some Red Alert vulnerabilities to get your blood pumping, and then dive into networking news. Cisco announces new data center switches with AMD Pensando DPUs that let you deploy security and other services directly on to the switch. Cisco ThousandEyes is previewing Traffic Insights, which correlates flow records ... Read more »...
Feb 18, 2025•38 min
Connecting your branch to your wide area network used to be simple enough. Call your carrier, get a circuit ordered, wait a long time, then turn it up. A little routing, and there you were. Cloud blew that model apart. Now when we connect branches to our corporate networks, we have to consider not only ... Read more »
Feb 14, 2025•45 min
Collaboration among tech and business teams is crucial to advancing your business. Extreme Networks is introducing Extreme Platform ONE to support this collaboration. In this sponsored episode, we talk about how this product is designed to streamline workflows and enhance user experience through automation and AI integration. Extreme Networks Platform ONE is a centralized platform ... Read more »...
Feb 14, 2025•43 min
Spanning tree is a topic so mysterious and complicated that common advice is just to disable it. In today’s episode, we start a mini-series on spanning tree, hoping to better explain what it is and what it does. We begin with basic spanning tree terminology and its role in preventing loops in an Ethernet network. ... Read more »
Feb 13, 2025•53 min
Embracing change is sometimes easier said than done. Today we talk with Monika Machado, who has held significant roles at companies like Microsoft and Oracle. She shares her story of learning and personal growth. Monika highlights the value of mentor-mentee relationships, continuous learning, understanding the difference between leadership and management, and the value of owning ... Read more »...
Feb 12, 2025•1 hr
The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity, and includes process ... Read more »...
Feb 11, 2025•43 min
Take a Network Break! We start with some red alerts for Cisco ISE, Zyxel, Microsoft, and a Web manager suite called WeGIA. US senators and security experts sound the alarm about DOGE employees introducing security and stability risks in sensitive US government systems, security researchers demonstrate the effectiveness of supply chain attacks that start with ... Read more »...
Feb 10, 2025•39 min
Unless you’re building out AI infrastructure at a hyperscaler, you probably don’t have unlimited dollars. On today’s Heavy Networking we talk with guest Frank Seesink about how to build and operate networks effectively when money’s tight. We look at free and open source tools, talk about the trade-offs that come with free software, and how ... Read more »
Feb 07, 2025•1 hr 10 min
Today’s episode with guest Joan Garcia provides valuable insights into the complexities of modern network operations at a telco, the importance of collaboration across technical domains, and the strategic decisions that drive innovation in the telecom industry. Joan’s experiences and perspectives offer ideas for navigating the challenges of integrating different layers of network architecture while ... Read more »...
Feb 07, 2025•1 hr
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered ... Read more »
Feb 06, 2025•49 min
Serverless is mature enough now to be a mainstream choice for application development. But that doesn’t mean interesting things aren’t happening. Benjamen Pyle joins Kyler and Ned on Day Two DevOps to talk about the potential for small vendors and startups to develop high-quality services purpose-built to solve specific problems. They also discuss the benefits ... Read more »
Feb 05, 2025•39 min
JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack ... Read more »...
Feb 04, 2025•39 min
Take a Network Break! The US Justice Department blocks the HPE-Juniper merger with a surprise lawsuit, DeepSeek shakes up the AI world, and Broadcom rolls out quantum-safe Fibre Channel controllers. Sweden seizes a vessel suspected of tampering with a subsea cable, a code update could make Linux significantly more power-efficient, and the WLAN market gets ... Read more »...
Feb 03, 2025•30 min
On today’s show, we’re discussing the complexities of network design for AI computing at the edge. We’re not talking about AIOps, although that might come up in this conversation. Instead, we’re focusing on how to effectively cope with the network traffic patterns happening on your network as a result of AI computing workloads. Our subject ... Read more »
Jan 31, 2025•55 min
Today we get an education on what a high speed cable assembly really is from guest Ryan Harris from today’s sponsor, The Siemon Company. Ryan shares the evolution of high-speed pluggable cable assemblies from 64kbps ISDN B channels to 800 gigabit connections, and describes how they work. We discuss the Siemon Company’s history and its ... Read more »...
Jan 31, 2025•44 min
In today’s episode, we address listener Kieren’s question about the differences between LAG, MLAG, MC-LAG, and stacking. We tackle the nuances of Link Aggregation (LAG) and the Link Aggregation Control Protocol (LACP), and explain their roles in redundancy and bandwidth efficiency. We also discuss the complexities and differences among vendors and overall benefits of Multi-Chassis ... Read more »...
Jan 30, 2025•56 min
Are you ready to go from zero to hero in GitNops? On today’s podcast, we talk with Tom McGonagle, who shares and explains git, CI/CD and DevOps and how that all fits into network engineering. The conversation also covers the evolution of containerization and Kubernetes, highlighting their roles in modern network automation. Tom also encourages ... Read more »
Jan 29, 2025•45 min
Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, particularly in threat hunting ... Read more »...
Jan 28, 2025•43 min
Take a Network Break! We start with critical vulnerabilities affecting the Android OS, Cisco Meeting Management, and SonicWall, and then discuss a report that tens of thousands of Fortinet security appliances still haven’t been patched despite active exploits. Palo Alto Networks releases an open API to make it easier for developers to access Quantum Random ... Read more »...
Jan 28, 2025•38 min
Many of us have had network design discussions relating to natural disasters. What if a fire comes through? Or a flood? For most of us, those discussions don’t feel overly worthy of our attention. Yes, we should think about it. Yes, we should plan for it. If we’re really serious, we’ll even dust off the ... Read more »
Jan 24, 2025•53 min
Can we map DevOps principles and practices to network operations? Should we? On today’s show, we talk with Williams Collins and Eyvonne Sharp to understand DevOps both culturally and practically. We also discuss the challenges of applying DevOps to network operations. We look at lightweight options such as starting small, having a centralized source of ... Read more »
Jan 24, 2025•39 min
It’s history day on N Is For Networking! We learn about the development of IPv6 directly from Bob Hinden, one of the pioneers who made it happen. Bob discusses his journey from early work on ARPANET to his significant contributions to IPv6. We also cover the transition from IPv4, the challenges faced during IPv6’s creation, ... Read more »
Jan 23, 2025•50 min
Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and challenges in ... Read more »...
Jan 22, 2025•1 hr 1 min
It’s tempting to run IT organizations the same way we run infrastructure: as resource units to be applied to various jobs. But people aren’t infrastructure. They have opinions. They form teams. They operate on different incentives, which sometimes clash within an organization (i.e. sales vs. product managers, or infosec vs. everybody). Today’s guest, Lianne Potter, ... Read more »...
Jan 22, 2025•45 min
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about ... Read more »
Jan 21, 2025•40 min
Take a Network Break! Guest co-host John Burke joins Drew Conry-Murray for this week’s analysis of tech news. They discuss a string of serious vulnerabilities in Wavlink Wi-Fi routers, Fortinet taking a one-two security punch, and CISA director Jen Easterly calling out US hardware and software companies for being “inherently insecure.” Microsoft and Google put ... Read more »...
Jan 20, 2025•48 min