

The Everything Feed - All Packet Pushers Pods
Packet Pushers
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
Episodes
Mentioned books

Nov 5, 2025 • 45min
NAN105: Campus Network Automation, Powered by Cisco Agentic Workflows (Sponsored)
Join Stephen Orr, a seasoned Distinguished Solutions Engineer at Cisco, and Reid Butler, Director of Product Management, as they dive into the transformative power of Cisco Workflows. They discuss the evolution of campus networking, highlighting how automation can eliminate tedious tasks and improve operational efficiency. Reid shares insights on product management surprises while Stephen emphasizes starting with small automations. The duo also explores the integration of AI and third-party tools, all aimed at empowering engineers rather than replacing them.

Nov 4, 2025 • 32min
HW064: An Introduction to nOversight
Ben Toner, founder of Numerous Networks and creator of the nOversight Wi-Fi analysis tools, dives into Wi-Fi performance insights that are crucial for both users and professionals. He explains how the iOS app collects real-time data despite Apple restrictions, visualizes roaming changes, and infers bandwidth from data rates. Ben shares practical applications for home users troubleshooting weak connections and outlines professional uses, like site validation in venues. He also discusses future roadmap features blending device insights with environmental data.

Nov 3, 2025 • 30min
NB550: A Cornucopia of AI Switches; DNS Strikes Again
Discover the latest advancements in AI networking and cloud resilience as hosts delve into the innovative features of cutting-edge switches like Arista's R4 family and Celestica's DS6000. Learn about a critical DNS issue that led to a worldwide Azure outage, and receive vital updates on Firefox’s security vulnerabilities. Explore how companies are applying traditional security practices to AI, and gain insights into Qualcomm's upcoming inference processors designed for efficient machine learning.

Oct 31, 2025 • 42min
TNO048: Ops to Orchestrated: An Architect’s Automation Journey
Jesse Ford, an automation architect with extensive experience in service provider and enterprise networking, shares insights from his journey in real-world automation. He discusses why he favors Python for its ease of use and effective problem-solving. Jesse dives into evaluating tools like Ansible and Cisco NSO, emphasizing strategic choices for scaling automation. He also highlights how Itential's platform democratizes automation, allowing non-developers to participate. Lastly, he explains automating PCI compliance to save hundreds of hours, showcasing the tangible ROI of automation.

Oct 31, 2025 • 59min
HN803: How to Start a Networking Meetup
Steinn “Steinzi” Örvar, a lead product development engineer and founder of the Iceland Network Operators Group, shares his journey of launching ISNOG. He discusses the motivations behind starting a networking meetup in Iceland and the surprising turnout of around 100 attendees. Steinn provides insights into overcoming imposter syndrome, organizing venue logistics, and effective marketing strategies. He emphasizes the importance of sound quality and shares tips on engaging attendees with prizes and creating FOMO for future events.

Oct 30, 2025 • 44min
LIU003: A Chat With ‘The Cloud Therapist’
Chris Williams, known as the 'cloud therapist,' is a Developer Relations Manager at HashiCorp with a background in psychology. He discusses how his psychology studies enhance tech careers by refining conflict resolution skills. Chris shares insights on the role of a Developer Advocate, the importance of non-traditional backgrounds, and crafting talks for learners in DevOps. He emphasizes the value of community engagement for career growth and practical conflict resolution techniques that align stakeholder definitions to improve collaboration.

Oct 30, 2025 • 45min
PP084: Inside the CVE Process With Cisco (Sponsored)
Join Osman Hashmi, a Principal Engineer at Cisco, Marco Cassini from the Product Security Incident Response Team, and Joe Malcolm, the CISO for Infrastructure Engineering, as they dive into the intricate world of CVEs. They discuss the crucial roles of various organizations in vulnerability management, the complexities of CVSS scoring, and the importance of responsible disclosure. The trio also explores how Cisco collaborates with customers on patch validation and the rising demand for Software Bill of Materials (SBOMs). Plus, they tackle infrastructure resiliency and innovative AI solutions in cybersecurity.

Oct 29, 2025 • 49min
TCG061: How Are You Using AI?
William Collins and Evyonne Sharp dive into the AI hype, discussing its impact on venture capital and company valuations. They explore how everyday people are adopting AI tools and the implications for revenue models. The duo debates whether AI will replace developers and the changing job landscape. They also highlight significant investments in AI infrastructure and share their own AI workflows to boost productivity. Their insights on managing AI use in organizations provide a practical perspective on the technology's growing influence.

9 snips
Oct 29, 2025 • 58min
NAN104: The Art and Science of Writing a Network Automation Book
In this podcast, Jeff Kala, Principal Architect at Network2Code and co-author of the 'Network Automation Cookbook, 2nd Edition,' shares his journey from networking to automation author. He highlights his visual learning style and how it shaped his writing process. The discussion dives into the book's structure, covering Ansible basics to advanced tooling and practical use cases. Jeff also addresses when to transition from Ansible to custom code and emphasizes essential skills for modern network engineers, predicting a continued focus on configuration management.

Oct 28, 2025 • 36min
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You’re (Probably) Doing It Wrong
Dive into the intricate world of cybersecurity budgeting as the hosts uncover why traditional percentage-of-IT methods fall short. Learn how spending should reflect actual cyber risks rather than IT costs. The conversation highlights the shift in attack surfaces towards staff and cloud vulnerabilities, the importance of measuring median total time to contain breaches, and new threats posed by AI. Discover how to better assess and justify cybersecurity investments amidst evolving challenges in a landscape where perimeters no longer exist.


