

The Everything Feed - All Packet Pushers Pods
Packet Pushers
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
Episodes
Mentioned books

Jun 14, 2022 • 43min
Heavy Networking 635: Unified Network Fabrics With Juniper Apstra (Sponsored)
In today’s sponsored Heavy Networking we talk to Juniper Apstra about how how Apstra delivers on unified data center operations, why fabrics are everywhere, how Apstra differs from other automation and intent solutions, and more. Our guest is Mansour Karam, VP of Product Management.

Jun 13, 2022 • 56min
Network Break 386: Extreme Debuts SD-WAN, Digital Twins; Cisco Launches SASE Service
This week's Network Break kicks off with listener FU and then dives into new SD-WAN and AIOps offerings from Extreme Networks. Cisco announces a SASE service and hints at a broader cloud security strategy. Arista adds to its Layer 1 switch portfolio while Ericsson and BT team up on private 5G in the United Kingdom.

Jun 13, 2022 • 17min
Tech Bytes: The Evolution Of Zero Trust Network Access (Sponsored)
Today on the Tech Bytes podcast, sponsored by Palo Alto Networks, we talk about Zero Trust Network Access and how it’s evolving to provide more comprehensive and consistent security.

Jun 10, 2022 • 1h 4min
Heavy Networking 634: Why (Not) MikroTik?
Today's Heavy Networking gets into networking hardware from MikroTik, a vendor you may not have heard of. Our guest is Kevin Myers, a senior network architect and consultant who uses MikroTik with a variety of clients big and small. We'll find out what MikroTik is good for, and not good for, management and support, and more. This is a non-sponsored episode.

Jun 8, 2022 • 49min
Day Two Cloud 150: Proactive Network Operations With Augtera (Sponsored)
Sponsor and startup Augtera Networks joins Day Two Cloud to discuss Augtera's proactive network analysis and operations product, which is meant to make you aware of problems before they become…problems. Augtera brings together traditional network sources such as flows and SNMP, plus telemetry and metadata to provide actionable information across networks you own and networks you don't.

Jun 7, 2022 • 25min
HS025 Did You Know Your IT is a Crime Scene ?
Does planning for cybersecurity failure include the concept of 'crime scene' ? Can you provide evidence to an external investigation sufficient to get justice or simply prove to insurance investigator that you met the policy requirements ? Should you be lobbying governments ? How does this drive your cyber spending - defense, microsegmentation, detection or evidence collection ?

Jun 7, 2022 • 16min
Tech Bytes: How Aruba NaaS Changes Network Consumption (Sponsored)
Today on the Tech Bytes podcast we’re talking about Network as a Service with sponsor Aruba, a Hewlett Packard Enterprise company, including how Aruba defines NaaS, the market appetite for network as a service, customer examples, and more.

Jun 6, 2022 • 48min
Network Break 385: VMware, Juniper Release New Security Tools; Judge Orders IBM To Pay BMC $1.6 Billion
Today's Network Break podcast discusses a new threat analytics product from VMware, new security features from Juniper's cloud-delivered security service, a report from Morgan Stanley on why the big network vendors are chasing the enterprise campus, and more IT news.

Jun 3, 2022 • 47min
Heavy Networking 633: Building DPU Apps With NVIDIA DOCA (Sponsored)
In today's Heavy Networking podcast, sponsored by NVIDIA, we explore DOCA on Bluefield DPUs. DOCA is a runtime operating system on the DPU including tools for provisioning, deploying, and orchestrating containerized services. It's also an SDK to supports a range of operating systems and distributions and includes drivers, libraries, and tools. Our guests are Justin Betz and Wes Kennedy, both Technical Marketing Engineers with NVIDIA.

Jun 2, 2022 • 37min
IPv6 Buzz 102: The Problem With IPv4 Thinking
In this episode of IPv6 Buzz Ed, Scott, and Tom discuss "IPv4 thinking", what exactly it is, how it can be harmful to your IPv6 migration efforts, and—most importantly—how to avoid it.


