Vibe coding: give AI a description of what you want, the model writes the code, you ship it, and then you hope for the best. It works great for side projects, but it can fall apart the moment you point an AI agent at production infrastructure. Today, William and Eyvonne sit down with John Capobianco,... Read more »
Eric Chou is joined by Matt Campbell, a seasoned network engineer whose career has taken him into some of the most demanding and high-stakes environments around. Together they’ll explore how Matt’s automation philosophy, lessons learned, and best practices adapt when the margin of error is razor thin. Whether you’re automating basic configs or tackling brownfield... Read more »
The best strategy in the world won’t succeed if a team falters operationally. But what is operational excellence, and what does it take to acquire it? Cal Poly faculty member (and former Intel strategist) John Miranda shares his thinking with our Heavy Strategy listeners. He discusses concepts like the theory of constraints, root-cause analysis, and... Read more »
In the cybercrime industry, initial access brokers specialize in break-ins. They pick digital locks and slide open electronic windows, and then sell that access to other threat actors who specialize in ransomware, exfiltration, and other crimes. SocGholish is a widely used tool in the access broker toolkit. Typically disguised as a legitimate software update, SocGholish... Read more »
Lenny Giuliano, Sr. Distinguished Systems Engineer at HPE Juniper Networks, joins Holly and Ethan for another round of multicast. Part two helps fill in details not covered in episode 50. They cover how multicast traffic also affects Ethernet frame addressing, and the key differences between IPv4 and IPv6 multicast. They also explain new hybrid multicast... Read more »
When applying AI to network operations and automation, a strong data foundation is essential. In this sponsored episode, Eric Chou and Scott Robohn are joined by Surya Nimmagadda, Chief Data Scientist; and Joby Rudolph, Senior Distinguished Engineer, both from Selector. They discuss the importance of transparency in their data and how it can instill confidence... Read more »
Keith Parsons is joined by Bradley Wegner, the creator of the Build Your Own AP deep dive at WLPC. Brad discusses his class, which focuses on hands-on hardware experience of constructing an AP. He talks about balancing hardware costs with capabilities, sourcing the components, and the software and firmware involved. He also shares his vision... Read more »
Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you’ve got a serious headache for security and network teams. On today’s sponsored show... Read more »
Scott Robohn and networking expert Russ White dive into the concept of design for operations. That is, they look at how to connect the design of a protocol or solution to how people are actually going to use it. They examine how protocol designers often overlook the teams that must operate them, creating some “inoperable”... Read more »
William Collins and Eyvonne Sharp invite Skylar Sands, Senior Automation Engineer at World Wide Technology, to discuss what it means to integrate AI into the daily workflow in a meaningful way. Together they break down the shift in the automation engineer’s role now that AI can instantly generate the “toolkit” of Python, Ansible, and Bash,... Read more »
Eric Chou is joined by returning guest, Danny Wade a.k.a. Devnet Dan, to unpack everything you missed from AutoCon 4. AutoCon 4 had a heavy focus on AI’s role in network automation and Danny was there in person, has already blogged about his insights, and is here to break down the trends, takeaways, and key... Read more »
Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »
How should you shape your IT strategy around the possibility–or is it probability–that the AI economy is a true bubble and will burst soon? John Burke and Johna Johnson revisit the signs indicating that an AI bubble is in full swing and pointing to the potential for collapse in the near term. Doomsaying having been... Read more »
In this sponsored episode, Dylan Hensler, Customer Solutions Specialist with Statseeker, joins Scott for a breakdown of what allows Statseeker to move beyond traditional network monitoring. Together they discuss Statseeker’s ability to help NetOps teams detect issues faster, prove root cause, and operate with confidence by turning raw data into operational intelligence. They also discuss... Read more »
Today’s topic is Multiprotocol Label Switching or MPLS, a foundational technology that powers service provider networks and enterprise WANs all over the world. To help us break it down, we’ve invited James Bensley, a Network Tech Lead who’s spent fifteen years with MPLS. James explains what spurred the creation of MPLS and how it works... Read more »
Building a Network Source of Truth (NSoT) is only step one in an automation effort — turning it into operational automation is where outcomes happen. In this sponsored episode by Network to Code, Eric Fetty, a self-taught network engineer who literally automated his way through his CCIE lab, shares how he’s doing exactly that at... Read more »
In this sponsored episode, FluidCloud co-founders Sharad Kumar and Harshit Omar sit down with William and Eyvonne to discuss how FluidCloud tackles multi-cloud portability. They detail how FluidCloud acts as a cloning platform that scans an existing cloud or VMware environment, extracts complex infrastructure configurations (including compute and storage, as well as firewall rules and... Read more »
OpenIntent is an open-source, collaborative effort by network operators to develop a standard schema to describe the necessary information needed to deploy network equipment. Keith sits down with Jake Snyder, the developer behind OpenIntent. They discuss why he developed OpenIntent, the building blocks of the schema, and his vision for seamless Wi-Fi design interoperability. AdSpot... Read more »
On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »
Mav Turner, Chief Product Officer at Kentik, joins John Burke and Drew Conry-Murray for an in-depth conversation on the importance of deep visibility into enterprise networks. As networks grow more complex and stretch from on-prem and WAN to multi-cloud and edge locations, this sponsored discussion explores how good visibility supports everything from daily operations to... Read more »