Let’s talk about AI for NetOps: It’s not just coming, it’s here. There are tools to use, skills to acquire, and we want to talk about what’s needed for highly certified network engineers to skill up in AI. What certification opportunities or paths exist? What developments do we think we’re going to see here? And... Read more »
Eric sits down with two graduates from the CU Boulder Networking Engineering Master’s Program to discuss what they learned during their time in the program and how that translated into real world opportunities and experiences. They also offer some invaluable career advice from the “seven plus one” formula and the value of asking “dumb questions.”... Read more »
In this episode, we sit down with Adam Zimman, author and VC advisor, to explore the world of progressive delivery and why shipping software is only the beginning. Adam shares his fascinating journey through tech—from his early days as a fire juggler to leadership roles at EMC, VMware, GitHub, and LaunchDarkly – and how those... Read more »
Keith sits down with old friend Jussi Kiviniemi, CEO of Hamina, to unveil their new product: The Hamina Clip. Together they discuss this new wireless survey device, including its portable design, its price point, and its ability to help you perform surveys and create heat maps without a floor plan. They also compare it to... Read more »
OAuth is a widely used authorization (not authentication) protocol that lets a resource owner grant access to a resource using access tokens. These tokens define access attributes, including scope and length of time. OAuth can be used to grant access to human and non-human entities (for example, AI agents). OAuth is increasingly being abused by... Read more »
Are there some things that can come off your strategic planning radar for IT and cybersecurity in 2026? If you ask AI, you’ll get some surprising answers. Johna and John take a critical look at this AI-generated list to see which ones may or may not be “solved enough” to fall off the strategic planning... Read more »
Go beyond the basics to understand the mechanics that keep your default gateway from becoming a single point of failure. Ethan and Holly demystify Virtual Router Redundancy Protocol (VRRP), which helps provide network redundancy. They break down everything from the VRRP election protocol to the protocol’s unique communication methods. They also look back at previous... Read more »
In this sponsored episode, Eric sits down with Lee Peterson, VP of Product Management for Secure WAN, at Cisco. Together they discuss how Cisco Unified Branch is helping organizations scale, automate, and secure their distributed environments. They also define the Branch Network, discuss the major challenges facing network teams, and walk through Cisco’s vision of... Read more »
Is AI just a fad or is it fundamentally changing Wi-Fi operations? Keith sits down with Robert Boardman to discuss the reality of AI-augmented Wi-Fi engineering. Robert describes AI as a tool, and explains how it can be useful for automating monotonous tasks and proactive troubleshooting. They also explore the human factor and how experience... Read more »
The start of a new year is a good time to assess what’s important. We’ve gathered some Packet Protector listeners to talk about their security priorities for 2026 in a roundtable discussion with hosts JJ and Drew. We talk about key risks for 2026, whether those risks have changed since last year, use cases for... Read more »
Ethernet is everywhere. Today we talk with one of the people responsible for this protocol’s ubiquity. Doug Boom is a veteran of the Ethernet development world. His code has helped landers reach Mars, submarines sail the deep seas, airplanes get to their gates, cars drive around town, and more. Doug walks us through the origins... Read more »
Eric Chou is joined by Dr. Levi Perigo, Scholar in Residence and Professor of Network Engineering at the University of Colorado, Boulder. They discuss Levi’s non-traditional career path from being in the network automation industry for 20 years before shifting to academia and co-founding QuivAR. Levi also dives into the success of the CU Boulder... Read more »
The industry has pivoted from scripting to automation to orchestration – and now to systems that can reason. Today we explore what AI agents mean for infrastructure with Chris Wade, Co-Founder and CTO of Itential. We also dive into the brownfield reality, the potential for vendor-specific LLMs trained on proprietary knowledge, and advice for the... Read more »
Everything old is new again in this Packet Protector news roundup, from end-of-life D-Link routers facing active exploits (and no patch coming) to a five-year-old Fortinet vulnerability being freshly targeted by threat actors (despite a patch having been available for five years). We also dig into a clever, multi-stage attack against hotel operators that could... Read more »
Leaders may shy away from thinking about insider threats because it means assuming the worst about colleagues and friends. But technology executives do need to confront this problem because insider attacks are prevalent—a recent study claims that in 2024, 83% of organizations experienced at least one—and on the rise. Moreover, AI and deepfakes vastly enhance... Read more »
Ethan and Holly discuss the major differences between In-band and Out-of-band (OOB) management and the pros and cons of both. They explore how to implement a proper OOB network and critical use cases where OOB is required. They also explain the differences and roles of the data plane, the control plane, and the management plane.... Read more »
If you’re curious as to what Ethan and Holly have in store for 2026, they give you a sneak peak on today’s episode. Hint: Some of these topics might include letters like B, G, P, Q, o, S, A and I. They also take time in this episode to answer listener questions, ranging from how... Read more »
Today Eric Chou dives deep into network automation and operational simplicity with guest Hardik Ajmera, VP of Product Management at Extreme Networks. In this sponsored episode, they talk about the ‘network fabric’, Extreme Platform ONE, and, of course, what’s next with AI in the world of enterprise networking. Hardik also shares how customers in complex... Read more »
Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s pledge to follow... Read more »
Your next security teammate might not be a traditional hire — it could be a Digital Security Teammate (DST),” says Secure.com CEO Uzair Gadit. In this sponsored episode, Uzair explains the concept of a DST and how it differs from an AI SOC. He highlights the operational and business benefits of deploying DST, including improved... Read more »