TNO028: Move From Monitoring to Full Internet Stack Observability: New Strategies for NetOps (Sponsored)
Network monitoring, Internet monitoring, and observability are all key components of NetOps. We speak with sponsor Catchpoint to understand how Catchpoint can help network operators proactively identify and resolve issues before they impact customers. We discuss past and current network monitoring strategies and the challenges that operators face with both on-prem and cloud monitoring, along... Read more »
-------- Â
52:35
TL013: The Process Communication Model: An Algorithm for Effective Communication
On this episode of Technically Leadership, we’re joined by Aleksandra LemaÅ„ska to learn about the Process Communication Model (PCM), a framework for enhancing communication. Alex calls PCM an algorithm for people, and it can be useful for improving interactions with engineers and technical folks operating in high-stress environments. We talk about how PCM works, understanding... Read more »
-------- Â
37:59
N4N025: DHCP – Someone Get Me an Address!
The Dynamic Host Configuration Protocol (DHCP) assigns an IP address to a host that joins a network, along with other information necessary for the host to communicate. DHCP also has more to it, so this week’s episode is meant to be a solid introduction to this essential network protocol. We first discuss what it is... Read more »
-------- Â
56:43
NAN091: The Future of Autonomous Networking With Jeff Doyle
Today’s guest is Jeff Doyle, an expert in the networking industry with over 30 years of experience as a consultant, instructor, architect, author, and speaker. Eric chats with Jeff about his background and how he got into networking (spoiler: it was not a computer science degree!). The conversation explores Jeff’s current work and delves into... Read more »
-------- Â
46:52
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read more »
Listen to The Everything Feed - All Packet Pushers Pods, All-In with Chamath, Jason, Sacks & Friedberg and many other podcasts from around the world with the radio.net app