The Everything Feed - All Packet Pushers Pods
Channel Details
The Everything Feed - All Packet Pushers Pods
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
Recent Episodes
1639 episodesTNO057: The Self-Driving Network, Revisited
Scott sits down for an in-depth conversation with Kireeti Kompella. Together they explore his impactful career and the evolution of modern networking....
HN818: Introducing LIM: A Large Infrastructure Model for Multi-Cloud Terraform Migration (Sponsored)
One of the early promises of public cloud was that, in theory, you could move workloads from Cloud Provider A to Cloud Provider B for any number of re...
LIU010: Personal, Technical, and Slightly Unhinged: Listener Q&A
Kevin and Alexis take a break from their regular interviews to answer your questions! Join them for an unfiltered, wide-ranging discussion including t...
NAN115: Simplifying Network Automation with Wingpy
Wingpy is an open-source tool that aims to make it easier to automate network tasks that use Cisco APIs. Today Eric is joined by returning guest Andre...
TCG070: The Effort Illusion: Why AI Tools Reward Expertise, Not Shortcuts
The tech industry is split between two fantasies – that AI writes production software while you get coffee, and that everything AI touches is slop. T...
D2DO296: Make Multi-Cloud and Hybrid Cloud Portability a Reality With FluidCloud (Sponsored)
FluidCloud calls itself a cloud-cloning platform. In other words, the company can map and copy all the cloud infrastructure settings from one public c...
HS126: AI Everything, AI Everywhere, AI All At Once
At CES in January, NVIDIA, AMD, Siemens and others spun elaborate tales of a world suffused with AI: AI in the cloud, AI at the desktop, AI in the fac...
PP100: Building and Securing AI Agents – A Case Study
Kyler Middleton, a software developer in the healthcare sector, builds and supports AI bots and AI agents that are now widely used inside the company...
NB565: New Algorithm Claims Quicker Quantum Decryption; Nvidia Revenue Rockets Higher
Take a Network Break! Guest commentator Tom Hollingsworth joins Drew for today’s episode. We start with a double Red Alert from Cisco for its Secure F...
Tech Bytes: How Statseeker Delivers Critical Network Intelligence (Sponsored)
Today on the Tech Bytes podcast we hear from Statseeker, a network monitoring company that collects high-fidelity network data to help engineers and a...
HN817: Is There a Better Way to Do Software Defined Networking?
Software Defined Networking (SDN) is a centralized architecture in which a controller, or a hierarchy of controllers, runs software that computes netw...
N4N050: Multicast Fundamentals
Today’s learning adventure is an overview of multicast. Ethan and Holly have invited a guest to share his multicast expertise: Lenny Giuliano, Sr. Dis...
IPB195: Start Network Automation with IPv6!
If you’re looking for a network automation project but you’re worried about breaking stuff, why not build your automation adventure around IPv6? If yo...
D2DO295: Risks and Benefits of Putting AI in Production
Engineers and developers are using AI like never before, including in production. That has potential consequences, both good and bad, for uptime, oper...
HW072: Wireless-Adjacent Products from Digi International
Digi International has a whole lot of things that aren’t exactly in the Wi-Fi space, but are close enough to be of interest to WLAN engineers. Joining...
PP099: The Care and Feeding of Kerberos for Windows Environments
Today we’re going to learn about the care and feeding of a three-headed dog named Kerberos. Developed at MIT and released in 1989, Kerberos is a free,...
NB564: New Juniper Routers Pump Up AI and Cloud-Scale Traffic; Anthropic Vs. DoD
Take a Network Break! We start with follow-up on the proper pronunciation of the US state of Nevada, and then sound the alarm about new research that...
Tech Bytes: Protecting OT Networks When the Perimeter Vanishes (Sponsored)
OT networks used to be air-gapped. These days, more and more OT networks are being bridged by IT networks, which exposes critical industrial controls...
TNO056: A Culture of Precise Work: Data Center NetOps
With the continued growth of data centers for clouds, neoclouds (especially AI model training), for carriers, and for the enterprise, it’s important t...
HN816: Inside the Case: A Hardware Deep Dive with Meter (Sponsored)
Our topic today is the designing and building of high-performance networking hardware. If you assume the hardware details don’t matter, you’re missing...
LIU009: Navigating Cybersecurity Careers
Alexis and Kevin sit down with Mike Miller to discuss what brought him from the back of a garbage truck to his current position as a Virtual Chief Inf...
TCG069: Viral Predictions, Waterfall’s Comeback, and the SaaSpocalypse
William and Eyvonne tackle the biggest AI stories of early 2026. They dissect Matt Schumer’s viral “Something Big is Happening” essay – agreeing profe...
NAN114: Demystifying Automation Tools, Processes, and Culture Gates
Eric sits down with David Henderson, Principal Architect for NetDevOps at Presidio, to discuss the practical journey for network engineers transitioni...
PP098: What Goes On Inside a Firewall?
On today’s show, we pop the lid off of a firewall (figuratively speaking) to understand what’s inside. We talk about how a packet moves through variou...
HS125: How to Choose an IT Hiring Service
Every employer knows to conduct background checks. However, conducting background checks on IT professionals requires an extra layer of verification,...
NB563: Palo Alto Networks Nets Koi for AI Security; Quantum Networking Notches Research Wins
Take a Network Break! We start with follow-ups on secure browsers and data centers in space, and then sound the red alert about an RCE vulnerability i...
HN815: All About PCE
Traditional routing protocols like OSPF simply choose the “shortest” path. If the shortest path is full of traffic and there are alternate paths carry...
N4N049: Understanding Firewalls
Today, Ethan and Holly provide an overview of firewalls. While cybersecurity is a separate discipline from network engineering, much of what happens i...
IPB194: Naval Gazing at NAT in IPv6
Ed, Nick, and Tom discuss the need for Network Address Translation v6 to v6 (NAT66). While Network Prefix Translation (NPTv6) exists, its limitations...
D2DO294: AI in My Vuln Research Workflow
Kat Traxler, Principal Security Researcher at Vectra AI, returns to the podcast to discuss her AI-powered vulnerability research workflow. She explain...
HW071: New iOS Tools for WLAN Pi
Adrian Granados joins Keith Parsons to discuss new iOS tools available for the WLAN Pi. These new tools extend a professional’s ability to run Wi-Fi...
PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)
With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identi...
Tech Bytes: We Need More Network Engineers; Here’s Ideas to Make It Happen (Sponsored)
Where are all the network engineers? OK, obviously, there are network engineers out there, like the thousands of you listening to this podcast. But th...
NB562: Cisco Challenges Broadcom With 102.4Tb ASIC; Arista Reaches Record Revenues
Take a Network Break! We start with listener follow-up on data centers in space, and sound the Red Alert about a sandbox failure in Claude Code and a...
TNO055: Testing as a Service for Telco Network Services
Scott talks with Mark Gebert from Verizon about something that sits at the heart of every reliable enterprise network: testing. Automation is moving f...
HN814: Automating Your Network with Cisco Crosswork Workflow Manager (Sponsored)
Our topic today is building and running network workflows. If your network workflows live in a spreadsheet, a SharePoint document, or in your head, yo...
LIU008: Breaking Barriers: Thriving as a Woman in Tech
Kevin and Alexis sit down with Melissa Brooks, a Senior Cloud Engineer at Aritzia, to discuss how she went from being a “terrible waitress” to going b...
TCG068: Agents and Identity – Navigating What We Can’t Predict
We’ve spent a decade figuring out how to (more or less) securely authenticate humans. Now AI agents are crashing the party, and identity just got a wh...
NAN113: What Works, and What Doesn’t, in Network Automation Projects
Today we are joined by Matt Remke, who has spent years in the trenches of network automation projects as a consultant. Matt offers a unique, non-engin...
PP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?
Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to...