The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation we record!
…
continue reading
Observability is foundational to application and infrastructure performance. That’s why it’s fitting that OpenTelemetry is the second most active project in the CNCF after Kubernetes. Today CNCF ambassador Dotan Horovits tells us about the project: OpenTelemetry is a uniform, vendor-agnostic observability framework for generating and collecting tel…
…
continue reading
1
NAN061: Transforming Network Telemetry Into Operational Insights With Kentik (Sponsored)
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:33
The expectations for application delivery are higher than ever before, the networks that support those applications are increasingly distributed, and visibility is essential for network operations and troubleshooting. On today’s sponsored episode, Kentik’s Phil Gervasi joins us to discuss how Kentik collects essential performance data to help you m…
…
continue reading
1
D2C241: Choose Your Own Adventure: Manager, Director, or IC
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10
What makes for a good manager, director, and independent contributor (IC), and how do you figure out which is the best fit for you? Hazel Weakly has had a whirlwind tour of all three and is ready to share her insight into each. We talk about the skill set needed for each, and figuring out... Read more »…
…
continue reading
1
PP011: IoT Protocols: Detection and Protection
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50
IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing... Read more »…
…
continue reading
1
HS070: Living on the Edge: The Present Future of Edge Architecture
30:28
30:28
Play later
Play later
Lists
Like
Liked
30:28
Right now we’re in the first generation of edge architecture. We won’t even really know how to define it until we’re past it. Greg and Johna discuss the operational milieu in which the edge is forming: Vast numbers of IoT devices, increased remote computing capabilities, questions around cloud operational costs and efficiency, and vendors jostling.…
…
continue reading
1
NB475: Cisco Hypes Hypershield; Broadcom Tries To Clarify VMware Strategy
1:00:52
1:00:52
Play later
Play later
Lists
Like
Liked
1:00:52
Take a Network Break! This week we cover Hypershield, a new Cisco security product that uses technology from its Isovalent acquisition. We parse a blog from Broadcom CEO Hock Tan on the company’s VMware strategy, and discuss China’s latest counter-punch in its tech infrastructure fight with the United States. A KPMG survey reveals that executives..…
…
continue reading
1
Tech Bytes: Begin Your Unified SASE Journey with Next-Gen SD-WAN (Sponsored)
18:40
18:40
Play later
Play later
Lists
Like
Liked
18:40
Secure Access Service Edge, or SASE, combines SD-WAN with cloud-delivered security services including next-gen firewall, CASB, secure web gateway, and others. You can mix and match your SD-WAN and cloud security, but today Rajesh Kari from Palo Alto Networks is here to advocate for the benefits of their single-vendor option. We talk performance, se…
…
continue reading
1
HN730: Retail, Healthcare, Manufacturing and More Transform Their Branches with Next-Gen SD-WAN and SASE (Sponsored)
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33
If you haven’t made the leap from traditional wide area networking to SD-WAN, or perhaps you’re thinking about adding security services to your SD-WAN infrastructure, this episode is for you. Rajesh Kari from Palo Alto Networks joins the show to share customer stories from the front lines of multi-branch businesses’ networks. Industry verticals inc…
…
continue reading
1
IPB149: A Progress Report on the Federal Government’s IPv6 Migration
40:47
40:47
Play later
Play later
Lists
Like
Liked
40:47
When you chair the IPv6 Task Force for the United States Federal Government, you get a pretty good view of IPv6 implementation across the world and in every aspect of American society. That’s why we have Rob Sears on the show today. He gives us his perspective as chair of the task force charged with... Read more »…
…
continue reading
1
Day Two Cloud: The Duality of Enterprise AI
55:14
55:14
Play later
Play later
Lists
Like
Liked
55:14
Welcome to a crossover episode with the Day Two Cloud podcast! AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to... Read more »…
…
continue reading
AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to give their takes on enterprise AI. Johna brings with her the... Read more »…
…
continue reading
1
NAN060: Python for Network Engineering with Kirk Byers (Part 2)
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46
This is Part 2 of Kirk Byers’ interview. We discuss the Git course he’s developing and the need to build bridges between networking and testing so we can move automation forward. This of course leads us to geek out about AutoCon and the talks we’re most excited about. Plus, Kirk shares his wisdom about creating... Read more »…
…
continue reading
1
PP010: CISA’s Cyber Incident Reporting Law: What You Need to Know
37:27
37:27
Play later
Play later
Lists
Like
Liked
37:27
The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical Infrastructure Act.” We break down the details, including what kind of companies the law applies to, what it defines as an “incident,” and... Read more »…
…
continue reading
1
HW025: Easy as Pi: The WLAN Pro’s Swiss Army Knife
39:21
39:21
Play later
Play later
Lists
Like
Liked
39:21
In 2016, a handful of wireless engineers got together and decided to create the portable tool they all wish existed. Thus the WLAN Pi was born. Jerry Olla, Nick Turner, and Jiri Brejcha join the show today to talk about the evolution of the open source WLAN Pi and its current capabilities. The latest generation... Read more »…
…
continue reading
1
NB474: Intel Strikes Back In GPU Wars; The Fork Is Strong With Valkey
1:02:12
1:02:12
Play later
Play later
Lists
Like
Liked
1:02:12
Take a Network Break! This week we start with some FU on Intel drivers, and how FISA affects people outside (and inside) the US. In the news we cover Intel’s rollout of new XPU silicon and associated software as it tries to make up ground against Nvidia’s AI dominance, Zscaler’s acquisition of a microsegmentation startup... Read more »…
…
continue reading
1
Tech Bytes: Building an Effective Security Platform with Fortinet (Sponsored)
18:42
18:42
Play later
Play later
Lists
Like
Liked
18:42
There’s a lot of well-earned criticism of security platforms: They’re a tangle of acquired products, packaged so you pay for more than you need, sucking you into a single vendor. Today John Maddison from Fortinet explains why their security platform is different. Fortinet has one unified fabric with a single operating system, agent, and management.…
…
continue reading
With “The Cathedral and the Bazaar” as his guide, Srivats launched Ostinato, his open source project, in 2010. He needed an affordable network traffic generator at his day job, he was passionate enough to build one during his nights and weekends, and end users loved it– it has been downloaded hundreds of thousands of times.... Read more »…
…
continue reading