There’s a lot of well-earned criticism of security platforms: They’re a tangle of acquired products, packaged so you pay for more than you need, sucking you into a single vendor. Today John Maddison from Fortinet explains why their security platform is different. Fortinet has one unified fabric with a single operating system, agent, and management... Read more »
With “The Cathedral and the Bazaar” as his guide, Srivats launched Ostinato, his open source project, in 2010. He needed an affordable network traffic generator at his day job, he was passionate enough to build one during his nights and weekends, and end users loved it– it has been downloaded hundreds of thousands of times.... Read more »
Whether you want to migrate legacy applications to Kubernetes in order to save the whales or for any other reason, Konveyor is here to help. Savitha Raghunathan joins us today to walk us through the open source tool. The basics: You input the application’s source code (any language that has a language server) and Konveyor... Read more »
You can’t just drop a knife on fish and expect there to be sushi. Jack Lindamood joins us today to share his metaphors and thoughts on picking the right IT tools and processes as outlined in his popular article, “(Almost) Every Infrastructure Decision I Endorse or Regret after 4 Years Running Infrastructure at a Startup.”... Read more »
In today’s episode Greg and Johna spar over how, when, and why to regulate AI. Does early regulation lead to bad regulation? Does late regulation lead to a situation beyond democratic control? Comparing nascent regulation efforts in the EU, UK, and US, they analyze socio-legal principles like privacy and distributed liability. Most importantly, Johna drives... Read more »
If your approach to firmware is that you don’t bother it as long as it doesn’t bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and for good reason: Attackers are targeting firmware because compromising this software can allow attackers to persist on systems after... Read more »
Take a Network Break! This week we start with some FU on Juniper’s Mist AI, the ConnectWise vulnerability, and the 25th anniversary of the Cisco Cat6. The US Cybersecurity & Infrastructure Security Agency (CISA) has proposed new rules that require organizations to report security incidents within 72 hours and ransomware payments within 24 hours. Intel... Read more »
To run AI workloads, a network needs thousands of GPUs and those GPUs must operate in sync. If there is congestion or dropped frames, very expensive efforts could be delayed or disrupted. While there are advantages to using Ethernet for AI networking (including engineers well-trained in the protocol and a robust ecosystem), it wasn’t designed... Read more »
Today Tom, Scott, and Ed discuss the exciting announcement in IPv6 world: Microsoft is expanding its CLAT support in Windows 11. This means enterprises can be even more comfortable transitioning to a IPv6-only network: Now not only do they have DNS64 and NAT64 to translate IPv4 to IPv6, but they have CLAT for any apps... Read more »
The intersection of Python and network engineering is Kirk Byers’ sweet spot. Today, the creator of the Netmiko library and core maintainer of NAPALM joins the show to tell us about his network automation journey. We also discuss Kirk’s experience on the business side of things, both the ups and downs. This is Part 1... Read more »
Learning cloud security can be daunting for experienced network engineers, much less complete newbies. That’s why Rich Mogull started “Cloud Security Lab A Week,” aka Cloud SLAW. Every Thursday, he emails subscribers a new hands-on lab, building a full enterprise deployment week-by-week, step-by-step. Rich explains all the details to JJ and Drew including the cost... Read more »
Today we talk to Sam Clements, founder of Wi-Fi Pros Slack. This online community has 1,600 members who share information and technical tips, talk shop, and connect with peers. Sam tells us how he developed the community over time, how he structures topics and channels, the ongoing fight against bots and spam, and where it... Read more »
Today Austin Hawthorne from Nile joins us to dig into the company’s Network as a Service (NaaS) approach and how it differentiates from traditional networking solutions. Nile aims to streamline network deployment and operations by providing a complete network service: It performs the site survey, provides the switches and access points, brings the gear on... Read more »
Take a Network Break! This week we try to peel back the layers on HPE’s announcement about new GenAI capabilties in Aruba Networking Central, parse Broadcom’s touting of its AI credentials, and feel conflicted about Intel sucking up billions in taxpayer dollars. South Korean chipmaker SK Hynix dangles a $4 billion investment promise to the... Read more »
Where there are containers, there is networking. Today we dig into the networking that underlies Kubernetes, the open source orchestration platform for container-based applications. Our guest Karim El Jamali takes us through the essential concepts: Nodes, pods, clusters, CNIs, virtual ethernet pairs, ingress controller, eBPF, and service meshes. As container-based applications grow in popularity, it’s... Read more »
Is WebAssembly (Wasm) here to replace containers? Not really, says guest Matt Butcher. Instead, Wasm is here for a specific kind of workload: One that needs to start super fast (under a millisecond), handle something, and then shutdown. Containers are still best for running very long, I/O intensive multithreaded workloads. Matt, Michael, and Kristina discuss... Read more »
Life isn’t easy for someone looking for a job in tech. There are lots of content mills pushing the idea that if you just pass this one six-month course, you’ll have a six-figure career in no time. There are lots of hiring companies who make job applicants jump through a ton of hoops, but often... Read more »
Welcome to a crossover episode with the Packet Protector podcast! You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So... Read more »
You’re already running IPv6, even if you don’t know it yet. Your remote users are using it at their homes, your printers come with it built into the kernel, your generals are using it on their mobile phones (check out our news headlines section). So let’s stop trying to disable it whack-a-mole style, and start... Read more »
On today’s Tech Bytes, we explore SR Linux, the network operating system developed by today’s sponsor Nokia. Why should you care about the network OS running in your data center? Nokia designed SR Linux to support automation, orchestration, and customization. We’ll dig into SR Linux’s support for YANG and gNMI and how that ties into... Read more »