The Fat Pipe Of The Packet Pushers Podcasts

The most popular shows from the Packet Pushers Podcast Network in one feed. 1-The Weekly Show (network engineering). 2-Priority Queue (even more network engineering). 3-Datanauts (the full IT stack including cloud). 4-Network Break (IT news and analysis from the week). 5-Briefings In Brief (interesting vendor stories in 15 minutes or less).

https://packetpushers.net

Eine durchschnittliche Folge dieses Podcasts dauert 47m. Bisher sind 1080 Folge(n) erschienen. Dieser Podcast erscheint alle 2 Tage.

Gesamtlänge aller Episoden: 17 days 19 hours 21 minutes

subscribe
share





recommended podcasts


Heavy Networking 577: A Customer View On Cloud-Delivered Security For Streamlining Distributed Workforces (Sponsored)


Today's Heavy Networking gets into cloud-delivered security for user access. We're sponsored by Palo Alto Networks, and we'll talk about its Prisma Access service with a customer: Josh Dye, SVP at Jefferies Group.


share







   41m
 
 

Day Two Cloud 096: Public Cloud Isn’t Wrong. You Are.


Today's Day Two Cloud is a wide-ranging discussion about the value of public cloud, a response to the growing backlash toward cloud cost and complexity, and techniques to better meld automation with application and infrastructure delivery.


share







   55m
 
 

Tech Bytes: VMware vRealize Network Insight: App-Aware Network Monitoring And Assurance (Sponsored)


This Tech Bytes podcast explores the network assurance and verification feature in VMware's vRealize Network Insight network monitoring software. This feature builds a real-time model of your production network by collecting information from switches,


share







   13m
 
 

Network Break 331: Proofpoint Goes Private In $12 Billion Deal; Defense Dept. Unveils IPv4 Address Cache


Guest analyst Johna Till Johnson, CEO and Founder of Nemertes Research, joins the Network Break to discuss a variety of IT news including the rising price of copper, Proofpoint going private in a $12.3 billion deal,


share







   54m
 
 

Heavy Networking 576: Deception And Canaries In Network Security


Today's Heavy Networking examines the role of deception and "canaries" in network security. A canary sits on a network segment (or multiple segments) and sounds the alarm if it comes under attack. Is this an effective security tool?


share







   57m
 
 

Day Two Cloud 095: Grappling With The Open Source Business Model


Today on Day Two Cloud we get into a whole lot of things. For example, what is IT's value in the age of cloud? How can IT figure out what's actually providing value to the business vs. undifferentiated heavy lifting?


share







   49m
 
 

Heavy Networking 575: Designing Better Networking And Security With SASE (Sponsored)


On today's Heavy Networking, sponsored by Palo Alto Networks, we examine what SASE means to you as a network engineer, its effects on how applications are protected and how you provide access to end users, and useful things to think about regarding how...


share







   56m
 
 

Tech Bytes: Rethinking Network Automation Using Nokia Fabric Services System (Sponsored)


Operating a data center fabric is a substantial challenge. Nokia Fabric Services System embraces automation to manage your data center fabric. In today's episode, sponsored by Nokia, we dive into Fabric Services System and SR Linux to learn how they br...


share







   21m
 
 

Network Break 330: VMware Stitches Together A SASE Offering; Nvidia’s Arm Purchase On Hold


This week's Network Break podcast examines VMware's new SASE offering for the distributed workforce, Nvidia's Arm-based accelerators, why the United Kingdom de-accelerated Nvidia's Arm acquisition, new routers from Juniper Networks,


share







   1h2m
 
 

Heavy Networking 574: Get HIP With Zero Trust And Tempered Networks (Sponsored)


Today's Heavy Networking podcast, sponsored by Tempered Networks, dives into how Tempered builds a software-defined perimeter with native zero trust, leveraging the Host Identity Protocol (HIP), Tempered's Airwall software, cryptographic identities,


share







   45m