This has been a big year for AI regulation, from the EU AI Act to the much hyped California SB1047, currently in limbo. With things bubbling along across the country, and at the federal level, and internationally, there’s a lot going on and IT folks should be keeping current and planning to meet a changing... Read more »
Today on Heavy Wireless we dive into how to address power mismatches that can arise between wireless clients and APs. We talk about how to measure output from antennas and APs, regulations that affect your deployment, why cranking up the output on an AP doesn’t necessarily result in better coverage, and more. Guest Connor Burke... Read more »
Cyber insurance provides compensation if a company suffers financial loss due to a security incident such as a ransonware payment, costs of data recovery, legal expenses or fines, or damage to a company’s reputation. Today on the Packet Protector podcast, we discuss the ins and outs of cyber insurance with a policy holder. Joe Stern... Read more »
Traditional network monitoring was built around SNMP and logs. And while there’s still a role for these sources, network observability aims to incorporate more data to help you build a holistic picture of the network and its behavior and performance. These sources can include flows, streaming telemetry, APIs, NETCONF, the CLI, deep packet inspection, synthetic... Read more »
Hiring is never an easy process. On today’s show, guest Brian Hogan and host Laura Santamaria explore the intricacies of hiring top performers in the tech industry. Brian talks about how to set up a fair and structured interview process, including the use of rubrics to evaluate candidates consistently. He discusses the challenges of assessing... Read more »
What are the most essential topics to understand for a new networkers? Ethan Banks and Holly Metlitzky address a listener’s question about foundational topics, covering what a network is, the differences between packet-switched and circuit-switched networks, and the nature of the internet as a “network of networks.” They discuss the importance of Internet Protocol (IP),... Read more »
Traditional network monitoring was built around SNMP and logs. And while there’s still a role for these sources, network observability aims to incorporate more data to help you build a holistic picture of the network and its behavior and performance. These sources can include flows, streaming telemetry, APIs, NETCONF, the CLI, deep packet inspection, synthetic... Read more »
Some high-profile companies like Amazon are mandating all employees return to the office, full time. Justifications, when given, mostly revolve around productivity and innovation. We say, whoa there! The data don’t back up the idea that hybrid and remote work hurt productivity (kind of the opposite) or innovation, and the real justifications likely lie elsewhere.... Read more »
Surveillance is a fact of life with modern technology, be it corporate data harvesting or government snooping. If you’re thinking about personal privacy, today’s episode covers common tools for communication and Web browsing. We dig into the end-to-end encryption capabilities of the messaging tools Signal and WhatsApp, look at the capabilities and limits of the... Read more »
AI can support network operations, but it can also be complex, mysterious, and steeped in vendor hype. On today’s episode, guest Phil Gervasi clarifies some of the terminology and concepts of AI, including distinctions among concepts like generative AI, general AI, and large language models (LLMs). Phil shares tips for getting beyond the hype to... Read more »
Today we explore Virtual Local Area Networks (VLANs). This topic was prompted by a question from college student Douglas. We’ll explain the fundamental concepts of VLANs, such as their role in segmenting and managing network traffic, and the technical details for implementation. We’ll also address key topics including VLAN tags, access and trunk ports, and... Read more »
Microsoft’s Active Directory and Entra ID are valuable targets for attackers because they store critical identity information. On today’s Packet Protector, we talk with penetration tester and security consultant Eric Kuehn about how he approaches compromising AD/Entra ID, common problems he sees during client engagements, quick wins for administrators and security pros to fortify their... Read more »
Multi-Link Operation (MLO) is a major feature of Wi-Fi 7. At a high level, MLO allows a client and an AP to communicate using multiple radios and frequencies simultaneously. The result is an increase in throughput and resiliency. Today’s Heavy Wireless podcast dives into MLO with guest Jim Palmer, who presented on the topic at... Read more »
Everyone has their own hot take or bit of wisdom to share regarding technical leadership. Today, host Laura Santamaria weaves these insights on communication, collaboration, decision making and more from her guests on the first six episodes of Technically Leadership. Listen, reflect and then apply to your own leadership role. Episode Links: Laura Santamaria Packet... Read more »
In this episode of N Is For Networking, co-hosts Ethan Banks and Holly Metlitzky take a question from college student Douglas that turns into a ride on the networking highway as they navigate the lanes of bandwidth and latency. Ethan and Holly define the concepts of bandwidth and latency and discuss current data transfer protocols... Read more »
Ostinato is a network traffic generator aimed at network engineers who need test traffic, whether in a lab or production, to do things such as test circuit bandwidth, determine if SD-WAN or load balancing rules are working as intended, investigate packet drops, and more. Originally released as an open-source project, Ostinato is now offered as... Read more »
Security professionals often have an impulse to want to move on to the next new thing. While that can be helpful in a field that thrives on change, it can also make it hard to focus on routine tasks and mundane (yet essential) security controls and practices. Whether this impulse is due to varying degrees... Read more »
Analysis paralysis is a huge problem in IT – we “study” and “evaluate” and “keep on our radar” but then all too often have a choice and a need to act thrust upon us, and need to switch modes fast. How do we try to get more mileage out of the studying to get leverage... Read more »
In this episode of Total Network Operations the conversation focuses on the impact and implementation of AI on network operations. Host Scott Robohn is joined by guest Michael Wynston to discuss the foundational requirements for AI implementation, such as well-documented processes, version control, and lab testing. Michael also talks about the need for lifelong learning... Read more »
Frames and packets: how are they different and why is it important to know those differences? On this first episode of N Is For Networking, join co-hosts Holly Metlitzky and Ethan Banks to learn the fundamentals about frames and packets, plus some bonus material on layers and addresses. N Is For Networking is the newest... Read more »