

The Everything Feed - All Packet Pushers Pods
Packet Pushers
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
Episodes
Mentioned books

Oct 27, 2025 • 50min
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
In this discussion, Kevin Egan, Senior Director at Equinix, dives into the company's vital role in AI infrastructure. He highlights emerging trends in edge workloads and the significance of colocation as a third option for businesses. Kevin explains how Equinix facilitates low-latency, private connectivity for AI applications. He also touches on the increasing network demands from inferencing workloads, advocating for observability and integration. Discover how these innovations shape the future of AI networking!

Oct 27, 2025 • 19min
Tech Bytes: Why Equinix Should Be Part of Your AI Network Strategy (Sponsored)
Kevin Egan, Senior Director at Equinix, shines a light on the often-overlooked role of networking in AI infrastructure. He discusses trends in AI workloads and how edge computing is transforming localized inferencing. Egan elaborates on Equinix's co-location services as a vital third option between on-prem and cloud, ensuring low-latency, high-speed connectivity. He also explores the rise of GPU-as-a-Service and the importance of data governance. With insights on the future of AI networking, Egan reveals how users can optimize their strategies for success.

Oct 24, 2025 • 59min
HN802: Unifying Networking and Security with Fortinet SASE: Architecture, Reality, and Lessons Learned (Sponsored)
Nirav Shah, Senior VP of Products at Fortinet, and Ramnath Shanai, Director of Products for SASE, dive deep into Fortinet's innovative SASE architecture. They discuss how FortiOS supports a unified security and networking approach. Insights include advanced threat detection powered by AI and human analysts, flexible deployment options, and unique features like agentless accessibility and selective SSL decryption. The duo also highlights the importance of performance in cloud and on-prem solutions, addressing how their technology adapts to modern security demands.

7 snips
Oct 24, 2025 • 50min
TNO047: Advice From Both Sides of the Network Aisle
Senad Palislamovic, an experienced network engineer with roles at NVIDIA, shares his insights on network automation and AI for NetOps. He discusses the evolution of networking protocols and his journey from managing university networks to leading NVIDIA's global infrastructure. Senad emphasizes the critical importance of data quality and how AI can enhance log management. He also offers practical tips for effective vendor communication and reflects on a past outage incident, providing valuable lessons for today's NetOps engineers.

Oct 23, 2025 • 20min
IPB186: An Inside Look at RFC 9872 for Discovering v6 Prefixes
Explore the ins and outs of RFC 9872, which tackles NAT64 prefix discovery for IPv4-to-V6 translation. Co-author Nick Buralgio reveals the flaws in previous RFC 7050 and how it sparked the need for modern operational guidance. Learn why PREF64 via router advertisements is becoming the go-to method, offering better management and scaling than DNS64. Discover practical tips for network operators on evaluating their options and the motivations behind promoting PREF64 adoption.

Oct 23, 2025 • 50min
N4N041: Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB)
Dive into the fascinating world of networking as the hosts unpack the differences between Switched Virtual Interfaces (SVI) and Integrated Routing and Bridging (IRB). Discover the history of layer 2 and layer 3 communication, along with the challenges that led to these innovative solutions. Learn about the implications of the router-on-a-stick concept and how packet flow operates between VLANs. They also explore the evolution of layer-3 switches, bridging concepts to modern technologies like VXLAN, and the importance of identifying recurring patterns in networking.

Oct 22, 2025 • 40min
D2DO285: The Death of IaC Has Been Greatly Exaggerated
Malcolm Matalka, co-founder of TerraTeam and an expert in infrastructure-as-code (IaC), joins to debunk the myth that IaC is dead. He highlights IaC's vital role in managing infrastructure lifecycles and contrasts simple YAML with powerful IaC tools like Terraform. Discussion dives into Terraform's practical challenges, such as one-way workflows and drift, while celebrating its wide applicability. Matalka emphasizes that AI is here to assist, not replace IaC, and predicts a future where IaC and control-plane models converge, ensuring IaC's continued relevance.

10 snips
Oct 21, 2025 • 44min
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
Chuck Kessler, CISO at Pendo, shares his insights on the Model Context Protocol (MCP), an open-source tool that connects AI agents with enterprise data. He discusses the emergence of agentic AI, emphasizing real-world applications like travel booking. Security concerns are a major focus, with Kessler outlining authentication risks and the importance of scoped identities. He highlights industry collaboration for safe AI adoption and addresses how MCP can facilitate innovation while managing risks. Kessler also touches on the challenges of monitoring rogue AI usage.

Oct 21, 2025 • 23min
HW063: Designing a Wireless-First Office
Phil Sosaya, a skilled wireless and network architect, shares his vast experience in transforming offices to a wireless-first approach. He emphasizes the advantages of flexibility and cost-effectiveness over traditional wired setups. Phil details his unique design strategies, sharing why he skips site surveys and instead uses floor plans and Wi-Fi tools. He also discusses the adoption of Wi-Fi 6E, addressing the challenges of device chipset compatibility, and offers practical advice on setting up robust networks while balancing user density.

Oct 20, 2025 • 29min
NB548: Broadcom Brings Chips to Wi-Fi 8 Party; Attorneys General Scrutinize HPE/Juniper Settlement
In this engaging discussion, F5 faces consequences after a security breach involving state-backed actors. North Korean hackers are using the blockchain to hide malware, adding a twist to cybersecurity threats. Broadcom introduces its powerful 800G NIC aimed at enhancing AI workloads and samples early Wi-Fi 8 chips design. Meanwhile, a legal challenge arises as twelve state attorneys general scrutinize the settlement of HPE's Juniper acquisition. There's also a critical warning about a severe flaw in Azure Access door controllers that poses a risk for IoT security.


