Posted on 18 April 2014 | Leave a Comment
News of the Networking Industry in the time it takes to drink a coffee (more or less). This week we are joined by Amy Engineer to parse the news and dig into the business of technology.
Posted on 15 April 2014 | 5 Comments
Podcast: Download (Duration: 44:00 — 20.6MB) This is Part 1 in a special series looking at the inside of your network device. Although software will be at heart of network innovation, it will still run on hardware and it’s time to expose the internals of our network hardware and understand the hardware architecture inside a […]
Posted on 31 March 2014 | 2 Comments
How do vendors decide to make network products ? What is the process and thinking behind what happens inside the wall of the vendor ? Today, Greg is join by Omar Sultan from Cisco to talk broadly about how vendors make big decisions
Posted on 30 March 2014 | 2 Comments
Podcast: Download (Duration: 1:13:51 — 50.8MB) That’s right listeners, you’re not in Kansas anymore! It’s time to follow that Yellow Brick Road to another episode of Healthy Paranoia. Today, we’ll be discussing phone phreaking, hacking and fraud, oh my! So we’re off to see Wizard, the Wonderful Wizard of VoIP security, Patrick McNeil. Joining me […]
Posted on 24 March 2014 | 1 Comment
Podcast: Download (Duration: 56:10 — 26.1MB) At Networking Field Day 7, the delegates were treated to vendor demonstrations that challenged our thinking about the future of networking. Perhaps the industry is not agreed on just how we’ll implement and operate our networks in the coming years, but one thing is for certain. The landscape will be […]
- Show 183 – Storage Network Design
- Coffee Break – Show 5
- Show 182 – The Future of Networking Part 1 As Inspired By #NFD7
- Coffee Break – Show 4
- Show 181 – Intro to I2RS with Joel Halpern & Russ White
- Healthy Paranoia Show 22: The Three Ring Circus of Net Neutrality
- Coffee Break – Show 3
- Show 180 – The Art of Network Architecture: Business-Driven Design
- Show 179 – Avaya Efficient Data Center Design at Fujitsu & the Sochi 2014 Winter Games
- Coffee Break – Show 2
Community Blog Posts
Note: Some of this will be really basic for a lot of folks, but bear with me — in looking at the entire system as a system, there are going to be parts of each piece you'll already know, and other parts you don't … read more.
I've been thinking about this question quite a bit over the last year  and interestingly a debate over just this issue has recently erupted in the blogosphere (and elsewhere). Vidya Narayanan, who reignited the … read more.
Vidya Narayana, in a piece at Gigaom, said recently: So, why did I actually stop contributing to standards definitions? The primary one is the fact that while the pace at which standards are written hasn’t changed in … read more.
Okay, so we all know some little slice or another of the Internet. But how do all these slices really fit together? How does each player in the system make money by getting your device to connect to someone else's server … read more.
Through a court-mandated decision, access to Twitter has officially been blocked across all of Turkey. Weather or not this was the right decision; it is evident that people are not happy about it at all. As you already … read more.
Last month I had the opportunity to work with a company to perform an IPv6 pilot. There are a lot of elements to light up for an organization to use IPv6, most of them (but not all) being technical in nature. One of … read more.
“It’s impossible to solve significant problems using the same level of knowledge that created them!” --Albert Einstein Outages happen- it’s a simple fact of running any type of system, be it network, server, … read more.
The Dell networking team has asked the Packet Pushers to co-host a couple of Interop sessions at their booth. Greg Ferro and Ethan Banks will be at the Dell booth on Tuesday, 1-April and Wednesday, 2-April at 3:45pm. In … read more.
This is the write-up of a recent event we experienced on our network. This will be combination of a journal of symptoms, troubleshooting steps taken, and a brief overview of the environment and platforms involved. This … read more.
More Community Blog Posts
- Cisco Internal VLAN Usage
- Ordered FIB
- Restoring Trust in the Internet – Part 2
- Review: Hadoop Operations
- Secret CEF Attributes Part 6, The BGP Connection
- TCP/IP over VXLAN Bandwidth Overheads
- Using Next Generation MVPN to optimize your MPLS core – Part 1
- Secret CEF Attributes, Part 5
- NAT saves the day!
- INTER-AS VPNs and Carrier Supporting Carrier (CSC) Part-2