Can we map DevOps principles and practices to network operations? Should we? On today’s show, we talk with Williams Collins and Eyvonne Sharp to understand DevOps both culturally and practically. We also discuss the challenges of applying DevOps to network operations. We look at lightweight options such as starting small, having a centralized source of... Read more »
IPv6 adoption should cross 50% in 2025. In today’s podcast, we discuss the implications and significance of IPv6 adoption reaching this milestone. While this transition might not be visible to average users, it does impact IT professionals. We explore varying adoption rates across industries, and talk about compliance requirements will soon necessitate IPv6. We also... Read more »
It’s history day on N Is For Networking! We learn about the development of IPv6 directly from Bob Hinden, one of the pioneers who made it happen. Bob discusses his journey from early work on ARPANET to his significant contributions to IPv6. We also cover the transition from IPv4, the challenges faced during IPv6’s creation,... Read more »
Today’s Network Automation Nerds episode discusses Cox Communications’ journey to getting network automation right. We also talk about how they used network automation to support operating the network at the DEF CON hacker convention. Our guests are David Ezell, Joshua Watkins and Eric Hansen from Cox Communications. We dive into initial steps and challenges in... Read more »
It’s tempting to run IT organizations the same way we run infrastructure: as resource units to be applied to various jobs. But people aren’t infrastructure. They have opinions. They form teams. They operate on different incentives, which sometimes clash within an organization (i.e. sales vs. product managers, or infosec vs. everybody). Today’s guest, Lianne Potter,... Read more »
You asked for more IPv6 and we listened. In today’s episode, we talk with Ed Horley, co-host of the IPv6 Buzz podcast about IPv6 security, migration, and adoption. We talk about how your general security strategy doesn’t change with v4 or v6, but the trouble starts with a lack of v6 knowledge. We talk about... Read more »
Take a Network Break! Guest co-host John Burke joins Drew Conry-Murray for this week’s analysis of tech news. They discuss a string of serious vulnerabilities in Wavlink Wi-Fi routers, Fortinet taking a one-two security punch, and CISA director Jen Easterly calling out US hardware and software companies for being “inherently insecure.” Microsoft and Google put... Read more »
Traditional SD-WAN ensures that business-critical apps get the best-performing network path to deliver a good user experience and meet service levels. But as SaaS and cloud adoption increase, the best path across a WAN may not be enough. Techniques like WAN ops and legacy caching techniques may have worked for enterprise or private apps, but... Read more »
Do you think you have what it takes to be a manager? Should you go for it? Laura Santamaria, host of the Technically Leadership podcast, joins Ethan Banks to discuss those questions. They talk about the motivations for moving into a management role, the challenges of managing people, and the need to understand the business... Read more »
On today’s episode, we’re explaining high-speed Ethernet lanes at the request of listener Matthew. We cover lanes, channels, and their physical representation in networking – think actual cables. We explain both 40Gb and 100Gb technologies and compare them to Link Aggregation Control Protocol (LACP). We also have a discussion on standards and practical implications for... Read more »
How do you master Python? One bite at a time. On today’s show we talk with Bob Belderbos, co-founder of PyBites, a community and learning platform for Python. Bob shares his philosophy for learning Python in small bites with practical exercises, hands-on learning, and daily coding for improvement. We discuss the importance of small wins,... Read more »
It’s better to plan for your IT strategy than not. But sometimes circumstances arise such that the plan, no matter how well conceived, just doesn’t work any more. On today’s Heavy Strategy, we explore how and why you should change a plan in the context of IT and business objectives. Sometimes this means small changes... Read more »
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a... Read more »
Take a Network Break! We start with serious CVEs for Perl and Ivanti. On the news front, the FCC wants to license spectrum to raise money to help US telcos rip out Chinese network equipment–even though there’s no evidence Chinese equipment led to telco intrusions by Chinese attackers. Verizon boasts of 5.5Gbps download speeds on... Read more »
Packet capture and packet analysis is incredibly useful for problem-solving and troubleshooting. Analyzing packets is also a difficult skill to master. With the incredible array of network troubleshooting tools at our disposal, including emerging networking models for artificial intelligence, do we still need to fuss around with Wireshark in 2025? Our guest Chris Greer says... Read more »
Cloud networking is still networking, but there are differences. In this special collaboration episode between the Total Network Operations and Cloud Gambit podcasts, Scott Robohn, Eyvonne Sharp, and William Collins dive into the contrasts between traditional and cloud networking, and how network engineers raised on hardware and the CLI can flourish in cloudy environments. In... Read more »
Today’s topic is the default gateway, essential for routing traffic between networks. We explain its purpose, configuration, and the consequences of incorrect settings. Using home networks as an example, Ethan and Holly illustrate how default gateways enable devices to communicate with external networks. The discussion also covers routing tables, subnet masks, and the differences between... Read more »
OFDMA, or Orthogonal Frequency-Division Multiple Access, was introduced in 802.11ax. This technology allows a radio to split a single channel into multiple sub-carriers, which in turn can be used to send data to multiple devices at the same time. OFDMA is meant to reduce congestion by allowing APs to allocate resource units among, and communicate... Read more »
Measuring network speed seems straightforward: send some traffic between two endpoints and see how long it took. But what path did the traffic take? Were wired or wireless networks involved? What intermediary devices stood between your two endpoints? Was there interference? Congestion? Are device limitations affecting your results? The fact is, there’s more to measurement... Read more »
Once you get past a handful of Python scripts, network automation can be…daunting. If you want to make network automation process-driven, repeatable, reliable, and something that doesn’t just rely on your scripts and the knowledge inside your head, there’s an entire landscape that opens up before you. Have you thought about network discovery? How about... Read more »