Everything published by the Packet Pushers network.
…
continue reading
IT professional finding your job description changing? More and more tech added to your plate? You're not alone! Have a listen to these IT pros tell their stories about becoming full stack engineers.
…
continue reading
The Packet Pushers Podcast Network includes a lot of smart listeners. Sometimes, they want to try podcasting. This is where those new podcast ideas hatch! Have a listen to the voice of the IT community.
…
continue reading
1
HN731: GraphQL: Open Source Query Language for APIs
34:53
34:53
Play later
Play later
Lists
Like
Liked
34:53
What if instead of sending multiple queries out to APIs and getting disparate data back, you could just send a single query and receive a single answer. That’s exactly what GraphQL does for you. Rick Donato joins the show today to teach us about GraphQL and how it can help us on the path to... Read more »…
…
continue reading
Observability is foundational to application and infrastructure performance. That’s why it’s fitting that OpenTelemetry is the second most active project in the CNCF after Kubernetes. Today CNCF ambassador Dotan Horovits tells us about the project: OpenTelemetry is a uniform, vendor-agnostic observability framework for generating and collecting tel…
…
continue reading
1
NAN061: Transforming Network Telemetry Into Operational Insights With Kentik (Sponsored)
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:33
The expectations for application delivery are higher than ever before, the networks that support those applications are increasingly distributed, and visibility is essential for network operations and troubleshooting. On today’s sponsored episode, Kentik’s Phil Gervasi joins us to discuss how Kentik collects essential performance data to help you m…
…
continue reading
1
D2C241: Choose Your Own Adventure: Manager, Director, or IC
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10
What makes for a good manager, director, and independent contributor (IC), and how do you figure out which is the best fit for you? Hazel Weakly has had a whirlwind tour of all three and is ready to share her insight into each. We talk about the skill set needed for each, and figuring out... Read more »…
…
continue reading
1
PP011: IoT Protocols: Detection and Protection
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50
IoT devices are often like the tiny aliens in the locker in Men in Black: They’ve created a whole little world on your network without almost any humans knowing they exist. Today Troy Martin joins the show to teach us the basics of how to find and secure IoT devices on your network, specifically focusing... Read more »…
…
continue reading
1
HS070: Living on the Edge: The Present Future of Edge Architecture
30:28
30:28
Play later
Play later
Lists
Like
Liked
30:28
Right now we’re in the first generation of edge architecture. We won’t even really know how to define it until we’re past it. Greg and Johna discuss the operational milieu in which the edge is forming: Vast numbers of IoT devices, increased remote computing capabilities, questions around cloud operational costs and efficiency, and vendors jostling.…
…
continue reading
1
NB475: Cisco Hypes Hypershield; Broadcom Tries To Clarify VMware Strategy
1:00:52
1:00:52
Play later
Play later
Lists
Like
Liked
1:00:52
Take a Network Break! This week we cover Hypershield, a new Cisco security product that uses technology from its Isovalent acquisition. We parse a blog from Broadcom CEO Hock Tan on the company’s VMware strategy, and discuss China’s latest counter-punch in its tech infrastructure fight with the United States. A KPMG survey reveals that executives..…
…
continue reading
1
Tech Bytes: Begin Your Unified SASE Journey with Next-Gen SD-WAN (Sponsored)
18:40
18:40
Play later
Play later
Lists
Like
Liked
18:40
Secure Access Service Edge, or SASE, combines SD-WAN with cloud-delivered security services including next-gen firewall, CASB, secure web gateway, and others. You can mix and match your SD-WAN and cloud security, but today Rajesh Kari from Palo Alto Networks is here to advocate for the benefits of their single-vendor option. We talk performance, se…
…
continue reading
1
HN730: Retail, Healthcare, Manufacturing and More Transform Their Branches with Next-Gen SD-WAN and SASE (Sponsored)
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33
If you haven’t made the leap from traditional wide area networking to SD-WAN, or perhaps you’re thinking about adding security services to your SD-WAN infrastructure, this episode is for you. Rajesh Kari from Palo Alto Networks joins the show to share customer stories from the front lines of multi-branch businesses’ networks. Industry verticals inc…
…
continue reading
1
IPB149: A Progress Report on the Federal Government’s IPv6 Migration
40:47
40:47
Play later
Play later
Lists
Like
Liked
40:47
When you chair the IPv6 Task Force for the United States Federal Government, you get a pretty good view of IPv6 implementation across the world and in every aspect of American society. That’s why we have Rob Sears on the show today. He gives us his perspective as chair of the task force charged with... Read more »…
…
continue reading
1
Day Two Cloud: The Duality of Enterprise AI
55:14
55:14
Play later
Play later
Lists
Like
Liked
55:14
Welcome to a crossover episode with the Day Two Cloud podcast! AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to... Read more »…
…
continue reading
AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to give their takes on enterprise AI. Johna brings with her the... Read more »…
…
continue reading
1
NAN060: Python for Network Engineering with Kirk Byers (Part 2)
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46
This is Part 2 of Kirk Byers’ interview. We discuss the Git course he’s developing and the need to build bridges between networking and testing so we can move automation forward. This of course leads us to geek out about AutoCon and the talks we’re most excited about. Plus, Kirk shares his wisdom about creating... Read more »…
…
continue reading
1
PP010: CISA’s Cyber Incident Reporting Law: What You Need to Know
37:27
37:27
Play later
Play later
Lists
Like
Liked
37:27
The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical Infrastructure Act.” We break down the details, including what kind of companies the law applies to, what it defines as an “incident,” and... Read more »…
…
continue reading
1
HW025: Easy as Pi: The WLAN Pro’s Swiss Army Knife
39:21
39:21
Play later
Play later
Lists
Like
Liked
39:21
In 2016, a handful of wireless engineers got together and decided to create the portable tool they all wish existed. Thus the WLAN Pi was born. Jerry Olla, Nick Turner, and Jiri Brejcha join the show today to talk about the evolution of the open source WLAN Pi and its current capabilities. The latest generation... Read more »…
…
continue reading
1
NB474: Intel Strikes Back In GPU Wars; The Fork Is Strong With Valkey
1:02:12
1:02:12
Play later
Play later
Lists
Like
Liked
1:02:12
Take a Network Break! This week we start with some FU on Intel drivers, and how FISA affects people outside (and inside) the US. In the news we cover Intel’s rollout of new XPU silicon and associated software as it tries to make up ground against Nvidia’s AI dominance, Zscaler’s acquisition of a microsegmentation startup... Read more »…
…
continue reading
1
Tech Bytes: Building an Effective Security Platform with Fortinet (Sponsored)
18:42
18:42
Play later
Play later
Lists
Like
Liked
18:42
There’s a lot of well-earned criticism of security platforms: They’re a tangle of acquired products, packaged so you pay for more than you need, sucking you into a single vendor. Today John Maddison from Fortinet explains why their security platform is different. Fortinet has one unified fabric with a single operating system, agent, and management.…
…
continue reading
With “The Cathedral and the Bazaar” as his guide, Srivats launched Ostinato, his open source project, in 2010. He needed an affordable network traffic generator at his day job, he was passionate enough to build one during his nights and weekends, and end users loved it– it has been downloaded hundreds of thousands of times.... Read more »…
…
continue reading
1
KU053: Migrate Legacy Applications to Kubernetes with Konveyor
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55
Whether you want to migrate legacy applications to Kubernetes in order to save the whales or for any other reason, Konveyor is here to help. Savitha Raghunathan joins us today to walk us through the open source tool. The basics: You input the application’s source code (any language that has a language server) and Konveyor... Read more »…
…
continue reading
1
D2C239: “(Almost) Every Infrastructure Decision I Endorse or Regret”
41:56
41:56
Play later
Play later
Lists
Like
Liked
41:56
You can’t just drop a knife on fish and expect there to be sushi. Jack Lindamood joins us today to share his metaphors and thoughts on picking the right IT tools and processes as outlined in his popular article, “(Almost) Every Infrastructure Decision I Endorse or Regret after 4 Years Running Infrastructure at a Startup.”... Read more »…
…
continue reading
In today’s episode Greg and Johna spar over how, when, and why to regulate AI. Does early regulation lead to bad regulation? Does late regulation lead to a situation beyond democratic control? Comparing nascent regulation efforts in the EU, UK, and US, they analyze socio-legal principles like privacy and distributed liability. Most importantly, Joh…
…
continue reading
If your approach to firmware is that you don’t bother it as long as it doesn’t bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and for good reason: Attackers are targeting firmware because compromising this software can allow attackers to persist on systems after... Read more »…
…
continue reading
1
NB473: Duty To Report (Your Breaches); Intel Foundry Biz Loses $7 Billion
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35
Take a Network Break! This week we start with some FU on Juniper’s Mist AI, the ConnectWise vulnerability, and the 25th anniversary of the Cisco Cat6. The US Cybersecurity & Infrastructure Security Agency (CISA) has proposed new rules that require organizations to report security incidents within 72 hours and ransomware payments within 24 hours. In…
…
continue reading
1
HN728: How Drivenets Leverages Ethernet Fabrics For AI Networking (Sponsored)
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48
To run AI workloads, a network needs thousands of GPUs and those GPUs must operate in sync. If there is congestion or dropped frames, very expensive efforts could be delayed or disrupted. While there are advantages to using Ethernet for AI networking (including engineers well-trained in the protocol and a robust ecosystem), it wasn’t designed... Re…
…
continue reading
1
IPB148: Microsoft to Expand CLAT Support in Windows 11
16:55
16:55
Play later
Play later
Lists
Like
Liked
16:55
Today Tom, Scott, and Ed discuss the exciting announcement in IPv6 world: Microsoft is expanding its CLAT support in Windows 11. This means enterprises can be even more comfortable transitioning to a IPv6-only network: Now not only do they have DNS64 and NAT64 to translate IPv4 to IPv6, but they have CLAT for any apps... Read more »…
…
continue reading
1
NAN059: Python for Network Engineering with Kirk Byers (Part 1)
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37
The intersection of Python and network engineering is Kirk Byers’ sweet spot. Today, the creator of the Netmiko library and core maintainer of NAPALM joins the show to tell us about his network automation journey. We also discuss Kirk’s experience on the business side of things, both the ups and downs. This is Part 1... Read more »…
…
continue reading
Learning cloud security can be daunting for experienced network engineers, much less complete newbies. That’s why Rich Mogull started “Cloud Security Lab A Week,” aka Cloud SLAW. Every Thursday, he emails subscribers a new hands-on lab, building a full enterprise deployment week-by-week, step-by-step. Rich explains all the details to JJ and Drew in…
…
continue reading
1
HW024: Find Your People on the Wi-Fi Pros Slack
28:28
28:28
Play later
Play later
Lists
Like
Liked
28:28
Today we talk to Sam Clements, founder of Wi-Fi Pros Slack. This online community has 1,600 members who share information and technical tips, talk shop, and connect with peers. Sam tells us how he developed the community over time, how he structures topics and channels, the ongoing fight against bots and spam, and where it... Read more »…
…
continue reading
1
Tech Bytes: Simplifying Network Deployment & Operations With Nile (Sponsored)
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15
Today Austin Hawthorne from Nile joins us to dig into the company’s Network as a Service (NaaS) approach and how it differentiates from traditional networking solutions. Nile aims to streamline network deployment and operations by providing a complete network service: It performs the site survey, provides the switches and access points, brings the …
…
continue reading
1
NB472: HPE Adds GenAI to Aruba Central; Intel Eager to Slurp Billions in Subsidies
1:05:02
1:05:02
Play later
Play later
Lists
Like
Liked
1:05:02
Take a Network Break! This week we try to peel back the layers on HPE’s announcement about new GenAI capabilties in Aruba Networking Central, parse Broadcom’s touting of its AI credentials, and feel conflicted about Intel sucking up billions in taxpayer dollars. South Korean chipmaker SK Hynix dangles a $4 billion investment promise to the... Read …
…
continue reading
1
HN727: Kubernetes Networking Essentials
1:06:50
1:06:50
Play later
Play later
Lists
Like
Liked
1:06:50
Where there are containers, there is networking. Today we dig into the networking that underlies Kubernetes, the open source orchestration platform for container-based applications. Our guest Karim El Jamali takes us through the essential concepts: Nodes, pods, clusters, CNIs, virtual ethernet pairs, ingress controller, eBPF, and service meshes. As…
…
continue reading
1
KU052: Wasm is Not Here to Take Your Containers
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29
Is WebAssembly (Wasm) here to replace containers? Not really, says guest Matt Butcher. Instead, Wasm is here for a specific kind of workload: One that needs to start super fast (under a millisecond), handle something, and then shutdown. Containers are still best for running very long, I/O intensive multithreaded workloads. Matt, Michael, and Kristi…
…
continue reading
Life isn’t easy for someone looking for a job in tech. There are lots of content mills pushing the idea that if you just pass this one six-month course, you’ll have a six-figure career in no time. There are lots of hiring companies who make job applicants jump through a ton of hoops, but often... Read more »…
…
continue reading
1
Packet Protector: IPv6 Security Essentials
53:04
53:04
Play later
Play later
Lists
Like
Liked
53:04
Welcome to a crossover episode with the Packet Protector podcast! You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So... Read more »…
…
continue reading
You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So let’s stop trying to disable it whack-a-mole style, and start... Read more »…
…
continue reading
1
Tech Bytes: How SR Linux Lets You Take Control Of Your Data Center (Sponsored)
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03
On today’s Tech Bytes, we explore SR Linux, the network operating system developed by today’s sponsor Nokia. Why should you care about the network OS running in your data center? Nokia designed SR Linux to support automation, orchestration, and customization. We’ll dig into SR Linux’s support for YANG and gNMI and how that ties into... Read more »…
…
continue reading
1
NB471: Nvidia Unveils 800G Ethernet, InfiniBand Switches For AI Fabrics; ‘Ghost Jobs’ Haunt Job Boards
1:10:35
1:10:35
Play later
Play later
Lists
Like
Liked
1:10:35
Take a Network Break! Nvidia announces new 800G switches, one for Ethernet and one for InfiniBand, for building AI fabrics. Nvidia also announces an “AI supercomputer,” a rack-scale pre-built bundle of Nvidia GPUs and CPUs connected via InfiniBand switches. The NaaS startup Meter announces new campus switches and what it calls a “digital twin” capa…
…
continue reading
The Wireless LAN Professionals organization just had its 10th annual conference and who better to break it down than WLPC founder (and Heavy Wireless host) Keith Parsons and friend of the show Ferney Munoz. They review their favorite presentations as well as heartwarming moments. Episode Guest Ferney Munoz | Ekahau and CWNP Certified Wireless Netwo…
…
continue reading
1
HN726: From Automation to Orchestration for a FinTech Network (Sponsored)
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48
Fiserv is one of the largest payment processors in the world, In 2023 it handled more than 35 billion transactions worth $2.03 trillion US dollars. Its network is critical to the business. The organization knew it needed network automation, but early attempts got some things wrong. On today’s Heavy Networking we talk about how Fiserv... Read more »…
…
continue reading
1
IPB147: The Network Engineering Advantages of IPv6
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05
For years, Johannes Weber has heard network engineers around the world repeat the myth that IPv6 is more of a hassle than IPv4. So he made a list: “Why IPv6 is better than IPv4.” Don’t worry, solving global address exhaustion isn’t on it. In this episode, Johannes goes over his list with precision and passion... Read more »…
…
continue reading
1
KU051: Getting Under the Hood of Yellowbrick’s K8s Data Warehouse (Sponsored)
33:52
33:52
Play later
Play later
Lists
Like
Liked
33:52
In this episode of the Kubernetes Unpacked Podcast, Kristina and Michael catch up with Mark from Yellowbrick to talk about all things underlying architecture. Very rarely do we get a vendor to chat about what’s going on underneath the hood and how a particular application stack/tool is running, so this was an awesome episode! Mark... Read more »…
…
continue reading
1
D2C237: Managing Medical IoT Devices on AWS
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32
In this podcast episode, Randy Horton from Orthogonal and Ian Sutcliffe from AWS discuss the complexities of supporting regulated medical devices in the cloud. They explore the challenges of adhering to regulations, the importance of security, and the need for robust frameworks. The conversation highlights the non-prescriptive nature of regulations…
…
continue reading
1
NAN058: The Story of containerlab with Roman Dodin (Part 2)
34:18
34:18
Play later
Play later
Lists
Like
Liked
34:18
Welcome back for Part 2 of Eric’s interview with Roman Dodin, co-creator of containerlab. Roman describes containerlab as a “lab as code” tool that quickly and easily creates virtual networking topologies. With increased automation and containerization in network engineering, the tool’s popularity has exploded. We talk about how folks contribute to…
…
continue reading
1
HS068: What’s the Point of Having a Tech Strategy?
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59
What does having a tech strategy actually do for an organization? In today’s episode, Greg and Johna highlight how a good tech strategy benefits a company: creates a foundation of first principles, reduces bias in vendor decisions, better allocates human resources, kills bad ideas, sunsets projects, and makes meetings a little more enjoyable and ha…
…
continue reading
1
PP006: Effective Security for Small IT Shops
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11
This episode is for IT professionals who work in small- to medium-sized businesses and are expected to handle cybersecurity on top of issues like “my camera isn’t working on Zoom.” Guest Joe Stern has been filling this role for an 80-person company for almost 30 years. We talk about how he prioritizes risks, security tools... Read more »…
…
continue reading
1
Tech Bytes: Protecting Connected Medical Devices With Palo Alto Networks IoT Security (Sponsored)
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57
Medical devices are an essential element of patient care. They’re also network-connected devices that need resilient connectivity and security. On today’s Tech Bytes we examine the challenges of supporting and securing connected medical devices, including threats, vulnerabilities, and regulatory frameworks. We’ll also discuss strategies and best pr…
…
continue reading
1
NB470: NetBox Labs Adds On-Prem Support; ASML Vs. The Netherlands
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39
This week on Network Break we discuss a new on-prem version of NetBox Labs’ source-of-truth software with enterprise support, why Selector AI is adding an LLM to its operations and observability product, and whether a new Web application firewall from Cloudflare can protect LLMs against malicious prompts. Viavi Solutions consolidates the network te…
…
continue reading
1
HN725: Standing up a DC Network Using Terraform
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53
Matt Horn built a data center network through automation, remotely. This is the future of network engineering. Matt shares how his team did it technically: Terraform, a little Ansible, leveraging pipelines, etc. But he also shares the processes and culture that made it happen: Management and peer buy-in, tight enforcement based on user access, and.…
…
continue reading
CI/CD is not a villain. GitOps is not some kind of Kubernetes way of sneaking around it. In fact, GitOps falls under the CI/CD umbrella. Marcus Noble joins the show today to talk about how he uses a Kubernetes-native, open-source CI/CD framework called Tekton to test Kubernetes cluster creation, configuration, and deletion based on changes... Read …
…
continue reading
1
NAN057: Nile Incorporates Network Automation from the Ground Up (Sponsored)
47:00
47:00
Play later
Play later
Lists
Like
Liked
47:00
What if you could eliminate the burdens of networking without losing your control and visibility of the network? That’s the idea behind Nile. With Nile co-managing the network, you don’t have to spend all your time chasing down tickets, running patches, and dealing with CLI syntax. Instead you get to focus on higher level tasks... Read more »…
…
continue reading