Today on the Tech Bytes podcast we hear from Statseeker, a network monitoring company that collects high-fidelity network data to help engineers and administrators get visibility into physical, virtual, and logical interfaces to find problems faster, understand root causes, and spot behaviors and anomalies so you can prevent problems instead of just reacting to them.... Read more »
Software Defined Networking (SDN) is a centralized architecture in which a controller, or a hierarchy of controllers, runs software that computes network-engineered paths and pushes that forwarding scheme into the network. It’s also very complex, which can lead to network failures. What if there was a way to keep the benefits of SDN while also... Read more »
Today’s learning adventure is an overview of multicast. Ethan and Holly have invited a guest to share his multicast expertise: Lenny Giuliano, Sr. Distinguished Systems Engineer at HPE Juniper Networks. Lenny guides them through multicast principles and shares examples of where and how it’s used in live networks. He also explains how the OSPF routing... Read more »
If you’re looking for a network automation project but you’re worried about breaking stuff, why not build your automation adventure around IPv6? If your production traffic runs on IPv4, you can experiment with automated configurations and changes using IPv6 without negatively impacting that v4 traffic. You can get a two-for one experience learning both IPv6... Read more »
Engineers and developers are using AI like never before, including in production. That has potential consequences, both good and bad, for uptime, operations, security and risk management, and more. Today’s guest, Rich Mogull, guides us through the decision-making process of adding AI to your production lifecycle and possible ramifications. Rich is Chief Analyst at the... Read more »
Digi International has a whole lot of things that aren’t exactly in the Wi-Fi space, but are close enough to be of interest to WLAN engineers. Joining us today to talk about Digi International’s wireless tech, and what it means for wireless LAN pros, is Bob Blumenscheid. Bob discusses Digi’s offerings, including their XBee modules,... Read more »
Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free, open source authentication protocol that uses cryptographic keys to protect identity data as it crosses a network. Today, Kerberos is the backbone of Windows authentication. We’ll dive into... Read more »
Take a Network Break! We start with follow-up on the proper pronunciation of the US state of Nevada, and then sound the alarm about new research that gets around WiFi client isolation and could enable man-in-the-middle attacks. On the news front, AMD and Meta strike a massive deal in which AMD will sell its stock... Read more »
OT networks used to be air-gapped. These days, more and more OT networks are being bridged by IT networks, which exposes critical industrial controls and other systems to serious risk. On today’s Tech Bytes, sponsored by Palo Alto Networks, we dig into how organizations can detect “precursor signals” that may indicate a broader attack chain,... Read more »
With the continued growth of data centers for clouds, neoclouds (especially AI model training), for carriers, and for the enterprise, it’s important to discuss data center network operations and issues. Scott is joined by Dr. Peter Welcher, a consultant, blogger, and Tech Field contributor. Together, they dive into how latency and the rise of AI... Read more »
Our topic today is the designing and building of high-performance networking hardware. If you assume the hardware details don’t matter, you’re missing the intentional engineering required to build truly reliable and quiet infrastructure. In this sponsored episode, we discuss Meter’s hardware philosophy with our guest, Joshua Markell, Head of Hardware at Meter. Joshua walks us... Read more »
Alexis and Kevin sit down with Mike Miller to discuss what brought him from the back of a garbage truck to his current position as a Virtual Chief Information Security Officer (VCISO). He breaks down how a VCISO differs from a CISO, and discusses the two types of clients looking for VCISO services: those looking... Read more »
William and Eyvonne tackle the biggest AI stories of early 2026. They dissect Matt Schumer’s viral “Something Big is Happening” essay – agreeing professionals need to skill up now while pushing back on the doomsday framing with real-world examples from engineering disciplines. The conversation takes a fascinating turn as Eyvonne draws a parallel between AI-assisted... Read more »
Eric sits down with David Henderson, Principal Architect for NetDevOps at Presidio, to discuss the practical journey for network engineers transitioning from manual CLI operations to scalable NetDevOps and automation. They discuss how traditional networking knowledge and certifications are foundational, and suggest essential tools and habits for beginning your automation journey. David also shares a... Read more »
On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through various packet-processing elements inside a firewall, how header analysis and de-encapsulation work, which hardware component has the biggest impact on performance, why stateful inspection still matters in an age of... Read more »
Every employer knows to conduct background checks. However, conducting background checks on IT professionals requires an extra layer of verification, given the privileged access they typically have to IT systems and tools. Moreover, in this AI era, background checks need to be deeper and more effective than before–in the past we didn’t need to verify... Read more »
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability in NLTK. On the news front, Palo Alto Networks acquires a startup that monitors endpoints for malicious packages, browser extensions, scripts, and other threats, Lumen debuts a multi-cloud gateway... Read more »
Traditional routing protocols like OSPF simply choose the “shortest” path. If the shortest path is full of traffic and there are alternate paths carrying nothing, OSPF can’t help you. Path Computation Element (PCE) along with Path Computation Element Protocol (PCEP) is a way to construct forwarding paths through the network based on factors that distributed... Read more »
Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens in cybersecurity is interesting at the packet level, so there’s a good deal of overlap. It’s likely that as a network engineer, you’ll be managing, or at least dealing with, firewalls in your... Read more »
Ed, Nick, and Tom discuss the need for Network Address Translation v6 to v6 (NAT66). While Network Prefix Translation (NPTv6) exists, its limitations make it insufficient for real-world business needs. They also highlight that without a standardized NAT66, the market is forcing vendors to implement their own, hindering widespread IPv6 adoption. Episode Links: IPv6-to-IPv6 Network... Read more »