Join The New Stack’s editorial team to review the week’s hottest news in cloud-native technologies and at-scale application development. Editorial Director Libby Clark, Managing Editor Joab Jackson and TNS Founder and Publisher Alex Williams put more context around the stories we’re covering each week and look ahead to topics we expect will gain more attention in coming weeks. Guests include TNS writers and correspondents who join us to discuss what they’re hearing from tech industry insiders.
…
continue reading
New Stack Context Podcasts
Alex Williams, founder of The New Stack, hosts "The New Stack Analysts," a biweekly round-table discussion covering The New Stack's latest data research, and topics related to app development and back-end services. Listen to our other TNS Podcasts on SoundCloud: The New Stack Makers: https://soundcloud.com/thenewstackmakers The New Stack Context: https://soundcloud.com/thenewstackcontext The New Stack @ Scale: https://soundcloud.com/thenewstackatscale
…
continue reading
Commas in the Chaos is a podcast for upper elementary teachers who are juggling lesson plans, classroom chaos, and trying out what today’s grammar lesson is — all before lunch. Whether grammar feels like your jam or your nemesis, this show is here to help you make it easier, clearer, and a whole lot more doable. Hosted by Rachel, the owner of Uniquely Upper, each week brings short, actionable episodes packed with ideas that actually work — from quick grammar routines and sentence strategies ...
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Two Psych Doctors Spill the Tea on Mental Health Concepts & Presentations Shown in your Fave RealiTV Shows! Ever find yourself wanting to debrief that reality tv episode with your therapist? Or maybe you've wanted to ask them questions about something you've learned from the reality tv interactions, castmates, or news cycle? Come debrief with two licensed psychologists as they explore what we can all learn about ourselves, our relationships, and our society from our fave reality television s ...
…
continue reading
1
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »…
…
continue reading
1
Tech Bytes: Why Equinix Should Be Part of Your AI Network Strategy (Sponsored)
18:40
18:40
Play later
Play later
Lists
Like
Liked
18:40AI infrastructure conversations tend to be dominated by GPUs, data center buildouts, and power and water consumption. But networks also play a crucial role, whether to support huge file transfers to a compute cluster, stream telemetry from edge locations to feed AI pipelines, or provide high-speed, low latency connectivity for AI agents. On today’s…
…
continue reading
1
Love is Blind Couples Deep Dive | Love is Blind Season 9 ::} 110
1:00:35
1:00:35
Play later
Play later
Lists
Like
Liked
1:00:35The shocking behaviors of the couples from season 9 of Love is Blind are begging to be unpacked by psychologists in preparation for the reunion! And Doctor Ray is back just in time! She joins Doctor Kay in their deep dive into the 3 couples (KB & Edmond, Alli & Anton, and Sparkle Meg & Jordan) from the finale, plus Madison & Joe and Nick & Annie. D…
…
continue reading
1
HN802: Unifying Networking and Security with Fortinet SASE: Architecture, Reality, and Lessons Learned (Sponsored)
58:39
58:39
Play later
Play later
Lists
Like
Liked
58:39The architecture and tech stack of a Secure Access Service Edge (SASE) solution will influence how the service performs, the robustness of its security controls, and the complexity of its operations. Sponsor Fortinet joins Heavy Networking to make the case that a unified offering, which integrates SD-WAN and SSE from a single vendor, provides a... …
…
continue reading
1
TNO047: Advice From Both Sides of the Network Aisle
49:35
49:35
Play later
Play later
Lists
Like
Liked
49:35Senad Palislamovic has held many roles in his time, from engineer to network operator to sales engineer and back again. He’s been around long enough to see trends come and go. Senad visits Total Network Operations to share some of his observations on network automation, AI for NetOps, and the quality of network data. Senad... Read more »…
…
continue reading
1
IPB186: An Inside Look at RFC 9872 for Discovering v6 Prefixes
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10RFC 9872 makes recommendations for NAT64 prefix discovery for hosts supporting v4-to-v6 translation. Co-host Nick Buralgio is a co-author of this RFC, so we’re taking the opportunity to talk about it in detail. We discuss the problems RFC 9872 is addressing and why a new RFC was needed for operational guidance, not necessarily defining a... Read mo…
…
continue reading
1
N4N041: Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB)
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58If you’ve ever wondered what the difference is between a Switched Virtual Interface (SVI) and Integrated Routing and Bridging (IRB), today’s show is for you! Ethan Banks and Holly Metlitzky start with some history and the basics of communication between layer 2 and layer 3 and then explain how the concepts of SVI and IRB... Read more »…
…
continue reading
1
D2DO285: The Death of IaC Has Been Greatly Exaggerated
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52While declaring the death of Infrastructure as Code (IaC) or Terraform may get you clicks on LinkedIn, IaC is alive and kicking. On today’s Day Two DevOps we talk about why IaC still matters. Guest Malcolm Matalka argues that IaC provides the tools and a model for managing infrastructure across its lifecycle in a structured... Read more »…
…
continue reading
1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
continue reading
A wireless-first office is a sensible goal these days when most laptops don’t have an Ethernet port and lots of devices use Wi-Fi. Wireless and network architect Phil Sosaya led the transition to wireless-first offices at sites across the globe. He details his design approach, including why he doesn’t bother with site survey software. He... Read mo…
…
continue reading
1
Love is Blind Scene Deep Dive with Dr. Kay [SCENES INCLUDED] | Recap Episode | scenes of season 9 ::} 109
1:26:55
1:26:55
Play later
Play later
Lists
Like
Liked
1:26:55Video excerpt (with videos of scenes) found here: https://youtu.be/zLaFqDJBQjY Full video will be on Patreon.com/RealityTest While Dr. Ray is away, Dr. Kay came out to play solo host, deep diving into 3 scenes from Love is Blind season 9. In doing so, she examines the relational patterns between Madison & Joe, and Kalybriah & Edmond. …………………………… Fo…
…
continue reading
1
13. 5 Creative Ways to Use Task Cards in the Classroom
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Episode Summary Last week, I shared the big-picture why behind using task cards, and the real benefits that make them worth your time. This week, we’re moving from theory to practice. In this episode, I’m sharing five creative ways to use task cards in the classroom that go far beyond centers and early finishers. These ideas are designed to get you…
…
continue reading
1
NB548: Broadcom Brings Chips to Wi-Fi 8 Party; Attorneys General Scrutinize HPE/Juniper Settlement
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16Take a Network Break! On today’s coverage, F5 releases an emergency security update after state-backed threat actors breach internal systems, and North Korean attackers use the blockchain to host and hide malware. Broadcom is shipping an 800G NIC aimed at AI workloads, and Broadcom joins the Wi-Fi 8 party early with a sampling of pre-standard... Re…
…
continue reading
1
HN801: Will a Natural Language Interface (NLI) Replace Your CLI?
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of needing to understand the syntax of a specific vendor’s CLI, could a language model allow network operators to use plain language to get the information they need or the... Read more »…
…
continue reading
1
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
…
continue reading
1
LIU002: Do You Need a College Degree to Succeed in IT?
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29A college degree can be a useful stepping stone into a tech career, and it certainly doesn’t hurt to have it on your resume. But do you really need that college degree to succeed in IT? Maybe, maybe not. Today’s guest is Wes Noonan, whose non-traditional path into and through a career in IT has... Read more »…
…
continue reading
1
TCG060: Rockets, Networks, and Markets With Michael Reid
1:00:45
1:00:45
Play later
Play later
Lists
Like
Liked
1:00:45Michael Reid went from studying aerospace engineering to becoming CEO at Megaport, a global network-as-a-service platform. How did he get there, and what can we learn from his journey? We walk his career path, including a pivotal role scaling ThousandEyes from 74 million to over 2.4x ARR post-acquisition, and how those experiences shaped his approa…
…
continue reading
1
NAN103: The Evolution of Multi-Cloud Networking
47:47
47:47
Play later
Play later
Lists
Like
Liked
47:47We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud podcast. He recently wrote a 5-part blog series titled ‘Goodbye, Yellow Brick Road’ that reflects on his career path, including his decision to leave a startup. We discuss the impetus... Read more »…
…
continue reading
1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading
1
HS114: In or Out? Deciding Which IT Functions to Bring In or Push Out
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41In times of major change–whether in IT or the economy–organizations should take a fresh look at their sourcing strategy. Companies outsourcing key functions need to re-examine the reasoning and scrutinize the results. The same goes for in-house functions. IT leaders need to ask: is our sourcing strategy in line with our current corporate and IT... …
…
continue reading
1
NB547: New Cisco Router Targets AI DCI; Salesforce Launches ServiceNow Competitor
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55Take a Network Break! We start with listener follow-up on security browsers, and then dive into a deep pool of Juniper vulnerabilities to pick two critical ones affecting Juniper Space. We also get an update from SonicWall that the breach of its cloud storage service affected all users of the service. Cisco announces a new... Read more »…
…
continue reading
1
12. 3 Benefits of Using Task Cards (and Why You Should Use Them in Your Classroom)
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39Episode Summary You know that moment when you open your pacing guide and immediately think, How on earth am I going to fit all of this in? Between teaching 500 standards, trying to keep your sanity, and still having a few minutes left in the day, it’s a lot. That’s exactly why I want to talk about one of my favorite tools: task cards. In this episo…
…
continue reading
1
Exposing the Reality TV Fetishism and Sizeism Nobody Talks About || Awards Episode | Aug-Oct ::} 108
1:18:24
1:18:24
Play later
Play later
Lists
Like
Liked
1:18:24Reality TV Awards Episode with Doctor Kay & Doctor Ray! Winning moments from Golden Bachelor, Love Island Games, Love is Blind, and Real Housewives of Salt Lake City are all up for discussion! Dr.s Kay and Ray examine moments & castmates from the most recent–if not currently airing–seasons of these shows for their 8 signature awards, ranging from T…
…
continue reading
1
TNO045: IP and Optical Integration: Automation Across Layers
1:02:17
1:02:17
Play later
Play later
Lists
Like
Liked
1:02:17LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. Th…
…
continue reading
1
HN800: Root Cause Analysis for the Entire Stack (Sponsored)
1:11:47
1:11:47
Play later
Play later
Lists
Like
Liked
1:11:47Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue. But not root cause analysis for just the networking part of the stack. The full stack. Why? Because it’s not good enough to say “it’s not the network”.... Read more »…
…
continue reading
1
IPB185: When IPv6 VPN and DNS Don’t Cooperate
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06Sometimes weirdness occurs within DNS if you’re on an IPv4 network and you connect to a dual-stack or v6-only VPN. Maybe the browser doesn’t connect, but you can still send pings, or vice versa. Is the OS getting confused about which stack and which order of interfaces to request services? Is the weird behavior being... Read more »…
…
continue reading
1
N4N040: Mock Interview for a Network Administration Job
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who’s applying for a junior network administration role. The goal is to give Toni Mrowetz, our candidate, feedback. At the same time, we hope this helps anyone listening who might... Read more »…
…
continue reading
1
D2DO284: AI, MCP, and the Identities that Tie Them All Together
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07AI is developing at an incredible pace. With that development comes questions. For instance, how do you connect your resources to agents? How do agents connect with each other? And how do you keep it all secure? Our guest Christian Posta is here to guide us through AI, MCP, and the concept of workload identities.... Read more »…
…
continue reading
1
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26By Packet Pushers
…
continue reading
1
11. Teaching Grammar in Context: Why It Isn’t Enough on Its Own
13:53
13:53
Play later
Play later
Lists
Like
Liked
13:53
…
continue reading
1
HW062: Designing Access Points For the Enterprise
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18By Packet Pushers
…
continue reading
1
NB546: Meta Mulls GPU Startup Purchase; Indirect Prompt Injection Exacerbates AI Risks
50:42
50:42
Play later
Play later
Lists
Like
Liked
50:42By Packet Pushers
…
continue reading
1
Tech Bytes: Building a UEC-Supported AI Data Center Fabric With Nokia (Sponsored)
16:34
16:34
Play later
Play later
Lists
Like
Liked
16:34By Packet Pushers
…
continue reading
1
Confessing Unresolved Trauma & Revealing Internalized Ageism on Golden Bachelor | Season 2 | Recap Episode ::} 107
1:32:41
1:32:41
Play later
Play later
Lists
Like
Liked
1:32:41Examine how castmates reveal ageist bias and confess unresolved trauma on Golden Bachelor (episodes 1-2 of season 2) with Doctor Kay and Doctor Ray! A free excerpt of the video version of this episode is available on YouTube: https://youtu.be/9tXg-ShLiSg Dr.s Kay and Ray recap the first two episodes of The Golden Bachelor, starting with a lengthy e…
…
continue reading
1
TNO044: Inside a Global Enterprise Data Center Network Migration (Sponsored)
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
…
continue reading
1
HN799: Multi-Homing IPv6 to Your Home Lab
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »…
…
continue reading
Starting any new endeavor is hard. That’s particularly true for a career in tech. And that’s the reason Alexis Bertholf and Kevin Nanns are launching the Life In Uptime podcast. In each episode they’ll sit down with engineers, leaders, and builders in tech to uncover the stories behind their careers to help you see how... Read more »…
…
continue reading
1
TCG059: From Source of Truth to Knowledge Graph – Rethinking Network Data
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30Network automation has a data problem. Traditional tools may hit limitations when managing complex infrastructure relationships. We explore how OpsMill’s InfraHub uses graph databases and temporal versioning to create what our guest calls “the knowledge graph of infrastructure” – enabling true version control at the database level while maintaining…
…
continue reading
1
NAN102: Practical Applications for AI in Network Automation
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joining us today is Ryan Booth; he’s built a career around network automation, giving him a unique perspective on how network engineering, operations, software development, and AI intersect. We explore the…
…
continue reading
1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading
1
HS113: Bad Tech Romance: Five Signs You’re In an Abusive IT Relationship
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50Sure, some days you hate your job. But how do you know when an IT position has gone from being run-of-the-mill annoying to truly toxic? And what do you do about it? Johna Johnson and John Burke are joined by Sandy Miller, a pseudonym for a CIO at a major global company who talks about... Read more »By Packet Pushers
…
continue reading
1
10. Grammar Skills: How to Use Skill Stacking to Spot Gaps and Strengthen Foundations
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34
…
continue reading
1
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federa…
…
continue reading
1
Bachelor in Paradise Reunion Reveals! Power, Misogynist Avoidance, & Kat vs. Allyshia | Recap Part II ::} 107
1:07:19
1:07:19
Play later
Play later
Lists
Like
Liked
1:07:19No one talks about misogyny in male avoidance of women's emotions--Doctor Kay and Doctor Ray unpack it while examining the Bachelor in Paradise Reunion in their second recap episode! Find a FREE excerpt of the video episode on YouTube: https://youtu.be/eorzPIjYToM & the full video on Patreon: https://www.patreon.com/posts/video-episode-in-140235480…
…
continue reading
1
HN798: Fortinet Offers a SOC Every Org Can Grow Into (Sponsored)
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00On today’s Heavy Networking: the Security Operations Center, or SOC. When I think of a SOC, I picture a miniature version of NASA’s mission control: lots of computers, lots of people, some big boards with lines and arrows and telemetry scrolling across the screens. I also think of SOCs as requiring a lot of gear,... Read more »…
…
continue reading
1
TNO043: Under the Manhole Cover: The Architecture of an Internet Exchange
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, s…
…
continue reading
We’re diving into another IPv6 Basics today with the topic of dual-stack, which means running the IPv4 and IPv6 protocol stacks simultaneously. We get many questions about the implications of running dual-stack, and in this episode we’ll provide answers. We start by getting a little finicky about the definition of dual-stack, and then talk about...…
…
continue reading
1
N4N039: Configuring an IPsec Tunnel
1:01:20
1:01:20
Play later
Play later
Lists
Like
Liked
1:01:20We dive back into the world of IPsec with an episode dedicated to configuring IPsec tunnels. After discussing a listener comment regarding transport mode in IPsec tunnels, Ethan Banks and Holly Metlitzky work through topics such as multi-vendor IPsec configuration, licensing, and the details of configuration and routing. Bonus material: MTU size an…
…
continue reading
1
D2DO283: Lessons Learned When a Startup Doesn’t Take Wing
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10Today we talk to Elad Ben-Israel about his former startup Wing Cloud, and the language that was built along with it, Winglang. We discuss why Eland started Wing Cloud, lessons learned about founding a start up, and what the future holds for the Winglang language. Ad Spot: Faddom Faddom helps you discover and map your... Read more »…
…
continue reading
1
NAN101: Scaling Intel’s Data Centers with Network Automation (Sponsored)
52:21
52:21
Play later
Play later
Lists
Like
Liked
52:21Transforming over 5,000 network devices across 56 data centers is no small feat. Doing that with a very small team is even more impressive. On today’s episode, sponsored by Network To Code, we talk to Greg Botts from Intel, who with his team accomplished just that. They started with YAML files and DNS records and... Read more »…
…
continue reading