
TNO062: SONiC for Open Networking with Jeff Doyle
Scott Robohn is joined by networking legend Jeff Doyle to help us understand SONiC: Software for Open Networking in the Cloud. SONiC is an o...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

All podcasts, blogs, and news.

Scott Robohn is joined by networking legend Jeff Doyle to help us understand SONiC: Software for Open Networking in the Cloud. SONiC is an o...

A Mastercard survey reveals that 46% of small and medium businesses have experienced a cyberattack, and nearly 20% of those that suffered an...

Alexis and Kevin sit down with Linda Haviv, an AI/ML Engineer and founder of Coding Crystals. Linda is known for making AI infrastructure ac...

Eric Chou talks with Adrian Iliesiu aka NetGru, a seasoned CCIE veteran and community leader known for his work to simplify network automati...

Eyvonne and William sit down with Joseph Nicholson, a Network Operations Engineer with NTT DATA, to share how public speaking transformed hi...

In this sponsored episode, brought to you by Cisco, Keith sits down with Mark Rodrigue of Room & Board and Dan Davis of Cisco. They disc...

In theory, a zero trust initiative seems straightforward: you just need the right tools and maybe some whiteboard sessions to work out the a...

Enterprise strategists need to worry about securing their environments against AI-powered attacks. John and Johna discuss what cybersecurity...

Take a Network Break! It’s a busy show this week. We start with follow-up on Anthropic’s Project Glasswing, router bans, and end...

Dijkstra’s algorithm is the foundation of shortest path calculations for link state routing protocols. But researchers have developed a new...

Today’s episode is part one of a three part series to break down Network Access Control (NAC). Ethan and Holly start simple by explaining wh...

Tom Coffeen and Nick Buraglio welcome Chris Cummings to talk about developing code for IPv6. Chris argues that moving to IPv6 restores end-t...

Kyler and Ned are joined by Enrico Teotti, an independent consultant with over 25 years of experience. Enrico has worked with clients on rea...

What separates good Wi-Fi engineers from ones who really can troubleshoot anything? Linux. Understanding Linux—from packet capture wor...

A cryptographically relevant quantum computer is, at some point, going to emerge that can crack modern encryption. But we don’t know w...

Take a Network Break! We start with follow up on Anthropic’s Project Glasswing and Linux 7.0. On the news side, Cisco announces a prot...

Scott Robohn sits down with Andy Smith, a distinguished engineer with Arrcus Networks, where he and his team work to advance networking with...

On today’s sponsored Heavy Networking, we get off the AI hype train to talk about how different artificial intelligence techniques usefully...

Ray Cline has been in the tech trenches since he was twelve years old, helping his Dad run a bulletin board service. Today he runs an MSP ca...

Eyvonne Sharp and William Collins speak with Sif Baksh, Principal Solutions Architect at Tines, to discuss the power of automation. Sif shar...

Eric Chou is joined by Ashwin Joshi, a Senior Solutions Engineer at Keysight Technologies, to discuss the rapidly increasing demands that AI...

For decades, network and security professionals have adapted to technology change in a piecemeal fashion: a new rule here, an upgrade there,...

Your enterprise better have a cybersecurity strategy for AI. But where to start? Everywhere! Securing AI means securing all the AI layers an...

Take a Network Break! Our Red Alert covers a trio of vulnerabilities in Cisco ISE. On the news front, Cloudflare announces a private network...

On today’s episode Ethan is joined by Mark Prosser, a self-described Network Operator Advocate and Network Automation Dreamer, to embark on...

Today our hosts discuss IPv6 Privacy and Temporary Addresses to clarify how address provisioning can potentially work for host operating sys...

We asked for follow ups and you did not disappoint! On today’s show we respond to listener comments and corrections on multicast, routing pr...

Malware has shifted from phishing expeditions to open source packages, domains, and repositories. Ned and Kyler welcome Jenn Gile, co-founde...

Threat actors are behaving more like professional organizations in an effort to launch more effective and profitable attacks. We explore thi...

Speedtest Certified is a network connectivity verification program for properties and venues, allowing them to prove the performance of thei...

Take a Network Break! We commence with a red alert on FastMCP, and then debate whether Anthropic’s Project Glasswing is a marketing st...

How should you shape your IT strategy around the possibility–or is it probability–that the AI economy is a true bubble and will burst soon?...

Today we welcome Damien Garros, Co-Founder and CEO of OpsMill, to discuss how network automation is creating the need to redefine roles beyo...

On today’s sponsored episode we talk with David Gee, CEO at Curvium, a systems integrator and VAR. David holds thoughtful opinions abo...

Kevin and Alexis are back with a behind-the-scenes look at the podcast with guest Melina Bertholf, who joined the team a while back to help...

Vibe coding: give AI a description of what you want, the model writes the code, you ship it, and then you hope for the best. It works great...

Eric Chou is joined by Matt Campbell, a seasoned network engineer whose career has taken him into some of the most demanding and high-stakes...

The best strategy in the world won’t succeed if a team falters operationally. But what is operational excellence, and what does it take to a...

In the cybercrime industry, initial access brokers specialize in break-ins. They pick digital locks and slide open electronic windows, and t...

Take a Network Break! We start with a critical vulnerability in Cisco’s Integrated Management Controller. In the news, Verizon settles...

Ethan Banks sits down with Ryan Hamel at the 96th North American Network Operators’ Group (NANOG96). Ryan, a network automation developer fo...

Today our hosts discuss the essential role of Stateless Address Autoconfiguration (SLAAC) in successfully deploying an IPv6-mostly network....

Lenny Giuliano, Sr. Distinguished Systems Engineer at HPE Juniper Networks, joins Holly and Ethan for another round of multicast. Part two h...

Ned and Kyler discuss the state of platform engineering, DevEx, and how AI is affecting choices in those domains with guest Annem Shah. They...

When applying AI to network operations and automation, a strong data foundation is essential. In this sponsored episode, Eric Chou and Scott...

Keith Parsons is joined by Bradley Wegner, the creator of the Build Your Own AP deep dive at WLPC. Brad discusses his class, which focuses o...

Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting,...

Take a Network Break! Mozilla is our Red Alert topic, with critical vulnerabilities in Firefox and Thunderbird. On the news front, we cover...

Today on the Tech Bytes podcast we talk network automation. More specifically, we dig into the need for proper data management to support yo...

Scott Robohn and networking expert Russ White dive into the concept of design for operations. That is, they look at how to connect the desig...