Packet Pushers Team julkinen
[search 0]
Download the App!
show episodes
 
Artwork
 
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
  continue reading
 
Loading …
show series
 
Leadership has a huge impact on an organization’s culture, including tech teams. On the positive side, leaders can foster healthy, productive environments. On the negative side, they can build hostile, blame-centric viper pits. Today’s episode of Technically Leadership examines how to strive for the positive by shielding teams from internal politic…
  continue reading
 
On today’s episode, we chat with wireless ISP engineer Elijah Zeida. Elijah had an interesting connectivity challenge to solve for a remote mountain town that relies on a wireless connection for Internet access, and not much budget to solve it with. But he got it done by building his own SD-WAN using Mikrotik boxes and... Read more »…
  continue reading
 
Everyone has their own hot take or bit of wisdom to share regarding technical leadership. Today, host Laura Santamaria weaves these insights on communication, collaboration, decision making and more from her guests on the first six episodes of Technically Leadership. Listen, reflect and then apply to your own leadership role. Episode Links: Laura S…
  continue reading
 
Ostinato is a network traffic generator aimed at network engineers who need test traffic, whether in a lab or production, to do things such as test circuit bandwidth, determine if SD-WAN or load balancing rules are working as intended, investigate packet drops, and more. Originally released as an open-source project, Ostinato is now offered as... R…
  continue reading
 
We are firmly entrenched in a hybrid cloud world, from on-prem data centers to multiple cloud platforms to branch and remote offices, not to mention wandering end users connecting via VPN. While the network is the common substrate among all these locations, every cloud provider has its own network implementation. Managing, monitoring and securing a…
  continue reading
 
Security professionals often have an impulse to want to move on to the next new thing. While that can be helpful in a field that thrives on change, it can also make it hard to focus on routine tasks and mundane (yet essential) security controls and practices. Whether this impulse is due to varying degrees... Read more »…
  continue reading
 
Analysis paralysis is a huge problem in IT – we “study” and “evaluate” and “keep on our radar” but then all too often have a choice and a need to act thrust upon us, and need to switch modes fast. How do we try to get more mileage out of the studying to get leverage... Read more »Kirjoittanut Packet Pushers
  continue reading
 
Take a Network Break! This week we discuss Google adding traffic shaping to its cross-cloud interconnect, Aviatrix bringing hybrid cloud transit to its cloud networking service, and Microsoft forcing MFA for Entra ID customers. Microsoft CEO Satya Nadella forgoes $5 million in incentive pay for Microsoft security lapses, Extreme Networks adds new f…
  continue reading
 
Alkira provides a Multi-Cloud Networking Service (MCNS) that lets you connect public cloud and on-prem locations using a cloud-delivered, as-a-service approach. But Alkira offers more than just multi-cloud connectivity. On today’s sponsored episode of Heavy Networking, we dig into Alkira’s full set of offerings, which include networking, visibility…
  continue reading
 
In this episode of Total Network Operations the conversation focuses on the impact and implementation of AI on network operations. Host Scott Robohn is joined by guest Michael Wynston to discuss the foundational requirements for AI implementation, such as well-documented processes, version control, and lab testing. Michael also talks about the need…
  continue reading
 
In this episode of Total Network Operations the conversation focuses on the impact and implementation of AI on network operations. Host Scott Robohn is joined by guest Michael Wynston to discuss the foundational requirements for AI implementation, such as well-documented processes, version control, and lab testing. Michael also talks about the need…
  continue reading
 
If you’re going to use DHCPv6, you have options, but there are some things you need to know in order to be able to build out your DHCPv6 configuration properly. Today’s IPv6 Buzz explores similarities and differences between DHCP and DHCPv6, particularly the operational model. And as always, you’ll want to verify and test before... Read more »…
  continue reading
 
AI is being integrated and adopted across much of the IT world, but can it work magic in transforming old legacy code into shiny modern code? When it comes to this magic trick, it’s important to look behind the curtain. On today’s Day Two DevOps podcast we discuss the reality of AI in refactoring code... Read more »…
  continue reading
 
What is a private mobile network and how does it work? Guest Jeremy Rollinson, an expert in private cellular networks, joins host Keith Parsons to clarify misconceptions about private mobile networks, from terminology to spectrum allocations. They explore the differences between public and private networks, the evolution of private mobile networks,…
  continue reading
 
Startup Alkira has built a Network as a Service (NaaS) offering that extends from on prem to public cloud and multi-cloud. Today’s sponsored episode of Heavy Strategy digs in to Alkira’s capabilities in multi-cloud networking, security, automation, and cost transparency. Guest Manan Shah, SVP of Product at Alkira, explains how Alkira simplifies net…
  continue reading
 
This episode was recorded live at Security Field Day (XFD) 12 in October, 2024. As delegates at the event, JJ and Drew heard presentations from DigiCert, Dell Technologies, SonicWall, and Citrix. These presentations covered topics including digital certificate management, post-quantum cryptography, supply chain security, recovering from ransomware,…
  continue reading
 
Take a Network Break! This week we discuss a new ZTNA offering from NaaS startup Alkira, a serious vulnerability in Fortinet’s management software under active exploit, and a less-serious vulnerability in Cisco security software that’s also being exploited. Gluware adds new AI copilots to its network automation software, a judge orders Broadcom to …
  continue reading
 
Ethernet competes with InfiniBand as a network fabric for AI workloads such as model training. One issue is that AI jobs don’t tolerate latency, drops, and retransmits. In other words, AI workloads do best with a lossless network. And while Ethernet has kept up with increasing demands to support greater bandwidth and throughput, it was... Read more…
  continue reading
 
Network optimization starts with observing, but how are networks observed and what tools are used? Joining the podcast today are the authors behind the book “Modern Network Observability.” Eric Chou welcomes David Flores, Christian Adell, and Josh VanDeraa to help uncover practical strategies and real-world case studies for network observability. E…
  continue reading
 
Enterprise data is everywhere: on prem, at the edge, and across the public cloud. Storing and managing that data involves more than just SSDs and spinning disks; it’s about building and operating a data infrastructure. On today’s Day Two DevOps podcast, host Ned Bellavance explores the idea of data infrastructure with Jeff Baxter, VP of... Read mor…
  continue reading
 
Today’s Packet Protector rounds up recent security news, including revised password guidelines from NIST, a White House push to help fill infosec jobs, and potential espionage risks from Chinese-made cranes being used at US ports. We also cover a hospital data breach that leaked nude patient photos, discuss why municipal governments are rich target…
  continue reading
 
In this episode, John and Johna share the findings from the recent [Next] conference that most inspired them: How to project-manage an 18-year effort to put a drone on Titan, why AI algorithms need to consider the factor of time, how to train robots, and why effective storytelling is an essential tool in a technology... Read more »…
  continue reading
 
This week’s Network Break discusses a CISA warning that a serious SolarWinds vulnerability is being exploited, Microsoft turns the tables by discovering a MacOS vulnerability, and Amazon invests in small modular nuclear reactors to meet growing power demands and reduce carbon output. T-Mobile releases a new device using the 5G Reduced Capacity spec…
  continue reading
 
The Tech Bytes podcast welcomes back sponsor Cisco ThousandEyes to talk about new features that improve visibility into both the public cloud and your on-prem network. We’ll get details on the new topographical mapping feature for AWS, as well as ThousandEyes’ new capability to consume flow records from on prem and correlate those records with... R…
  continue reading
 
AI is finding its way into more and more consumer and business applications. In particular, the widespread use of Generative AI raises a serious question: how secure is it? In this sponsored Heavy Networking episode we discuss security risks of AI tools and ways to mitigate those risks. Our guest is guest Rich Campagna, Senior... Read more »…
  continue reading
 
Join Mike Bushong, an industry expert, and host Scott Robohn as they talk about why Network Operations is the next big thing and why you should start with the end in mind for NetOps. Their proposal is that NetOps shouldn’t just get a seat at the table; they should get 51% of the vote. They... Read more »…
  continue reading
 
Join Mike Bushong, an industry expert, and host Scott Robohn as they talk about why Network Operations is the next big thing and why you should start with the end in mind for NetOps. Their proposal is that NetOps shouldn’t just get a seat at the table; they should get 51% of the vote. They... Read more »…
  continue reading
 
IPv6 address provisioning is the topic of this latest installment of the IPv6 Basics series. The hosts focus on Stateless Address Auto Configuration (SLAAC) and Dynamic Host Configuration Protocol for IPv6 (DHCPv6). The differences between SLAAC and DHCPv6 are explained, including their use cases, the complexities of address management, and the imp…
  continue reading
 
Job hunting is never easy and on today’s Day Two Cloud, Katrina Janeczko shares her journey from college to her current role at Comcast. Katrina discusses the challenges of job hunting, the relevance of her education, and the impact of AI tools on her learning process. She also talks about the importance of networking, mentorship,... Read more »…
  continue reading
 
Todd Thorpe is today’s guest on Heavy Wireless joining host Keith Parsons to explain the evolution of Wi-Fi technology in Multiple Dwelling Units (MDUs) like apartments and condos. Todd, with over 20 years of MDU experience, discusses the industry’s transformation from early coax cable services to modern managed Wi-Fi solutions. The challenges of r…
  continue reading
 
Uzair Khan from RUSH University Medical Center is today’s guest on the Network Automation Nerds podcast. Uzair discusses the complexities of healthcare technology and the critical role of automation in enhancing operational efficiency and patient safety. He provides examples of how Itential’s automation and orchestration products have given his tea…
  continue reading
 
Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers, need to become familiar with the operational challenges and quirks of ICS/OT systems. On today’s Packet Protector, guest Mike Holcomb demystifies ICS a…
  continue reading
 
Take a Network Break! This week we cover a new Juniper announcement and discuss how the company is bringing its security portfolio under its AI umbrella, Aryaka adding CASB to its SASE menu, and whether the FTC’s prescriptive security requirements for Marriott will actually lead to better security. Cisco invests in a GPU-as-a-Service startup, steal…
  continue reading
 
On today’s episode, guest James Henderson joins the Packet Pushers to discuss Cisco’s Network Service Orchestrator (NSO). NSO’s role in network automation, its declarative management approach, and the challenges it presents are some of the things James shares with the hosts. They also cover operational requirements, deployment challenges, and perfo…
  continue reading
 
Meter CEO Anil Varanasi joins Scott Robohn on this sponsored episode of Total Network Operations to talk about Meter’s vision for networking and network operations. In this podcast, recorded the day before Meter’s first public MeterUp event, Anil and Scott discuss Meter’s approach to building new networking equipment, vertical integration of their …
  continue reading
 
Meter CEO Anil Varanasi joins Scott Robohn on this sponsored episode of Total Network Operations to talk about Meter’s vision for networking and network operations. In this podcast, recorded the day before Meter’s first public MeterUp event, Anil and Scott discuss Meter’s approach to building new networking equipment, vertical integration of their …
  continue reading
 
Layoffs are a sensitive topic in the tech industry. Host Laura Santamaria discusses the emotional and practical impacts on employees and leaders. She also covers the signs of potential layoffs, and strategies for job searching post-layoff while maintaining perspective. She concludes with a tips for leaders to more effectively lead their teams throu…
  continue reading
 
Ivan Pepelnjak joins host Eric Chou to reflect on his extensive career, his decision to reduce his content creation, and offer advice for young engineers. They discuss the evolution of networking technologies, emphasizing the importance of mastering Linux and obtaining relevant certifications. Ivan highlights the significance of creating profession…
  continue reading
 
Today on the Packet Protector podcast we talk with sponsor Juniper Networks about how to simplify the complexity that affects network and cybersecurity teams alike. From tool sprawl to floods of data, complexity bedevils operations and troubleshooting. We talk about what Juniper brings to the table for networking and security professionals to help …
  continue reading
 
Don’t let the perfect be the enemy of the good… it’s a challenge that architects and strategists often face. They may design a “perfect” architecture or strategy, only to see it overwhelmed by the realities of implementation. John Burke and Johna Johnson discuss the questions to ask to ensure that devotion to the perfect doesn’t... Read more »…
  continue reading
 
Take a Network Break! DDI specialist BlueCat is getting into network performance monitoring with its LiveAction acquisition, T-Mobile is ordered to spend almost $16 million to improve its infosec practices and get a CISO, and Cisco announced the end of life for its LoRaWAN IoT product line. Verizon recovers from a US-wide outage, security researche…
  continue reading
 
Our topic today is digital twins. Sponsor Forward Networks offers software that creates a “mathematically accurate” copy of your network, be it on prem or in the cloud. We talk about what “mathematically accurate” actually means, and how a digital twin can support network operations including change control, network automation, visibility, and trou…
  continue reading
 
Guest Tom McGonagle, the creator of GitNops, is back with host Scott Robohn for part two of their GitNops discussion. They continue their conversation about the principles and applications of GitNops in network operations, including automated testing, the collaborative role of GitHub, and the challenges of ensuring accurate configurations before de…
  continue reading
 
Guest Tom McGonagle, the creator of GitNops, is back with host Scott Robohn for part two of their GitNops discussion. They continue their conversation about the principles and applications of GitNops in network operations, including automated testing, the collaborative role of GitHub, and the challenges of ensuring accurate configurations before de…
  continue reading
 
In this episode we discuss the complexities of deploying IPv6 on a compressed timeline. We cover the need for careful planning, training, and understanding the protocol’s nuances. The conversation looks at the risks of delaying deployment, the benefits of incremental implementation, and the global momentum towards IPv6 adoption. Misconceptions abou…
  continue reading
 
Cloudflare’s transition from SysLog-NG to OpenTelemetry is the topic of discussion on this episode of Day Two DevOps. Guests Colin Douch and Jayson Cena from Cloudflare explain the reasons behind the migration, including the need for better scalability, memory safety, and maintainability. They delve into challenges such as ensuring uninterrupted cu…
  continue reading
 
Wi-Fi 7 brings new features and capabilities to the market, including Multi-Link Operation (MLO) and airtime optimization, which can enhance throughput and reduce latency. In today’s episode of Heavy Wireless, host Keith Parsons and guest Phil Morgan explore the advancements and practical implications of Wi-Fi 7. Phil shares his experiences testing…
  continue reading
 
The terms “AI” and “machine learning (ML)” get thrown around pretty regularly in IT and cybersecurity. On today’s Packet Protector we get an introduction to AI and ML to help you ask the right questions when vendors tout their latest AI-infused products. Our guest is Jeff Crume, a distinguished engineer and cybersecurity architect at IBM.... Read m…
  continue reading
 
Cisco CIO Fletcher Previn visits Heavy Strategy to talk about how to create a technology culture, what it’s like being “customer zero”, and other challenges and tribulations of running IT from inside one of the world’s largest tech companies. Episode Guest: Fletcher Previn, SVP & Chief Information Officer, Cisco Fletcher Previn has over two decades…
  continue reading
 
Take a Network Break! This week we discuss significant vulnerabilities in HPE APs and Cisco Catalyst 9K switches, the benefits of bug bounties, how HPE is adding third-party device monitoring to Aruba Central, and whether Arista can succeed at positioning CloudVision as a management platform for enterprise data center, campus, and WAN environments.…
  continue reading
 
Loading …

Pikakäyttöopas