An Audio Blog, by Audio Content Lab, highlighting the latest in audio content marketing and sonic branding. © 2020 Audio Content Lab
…
continue reading
Audio Content Lab Team Podcasts
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
The Media Roundtable isn’t just another industry podcast; it’s an open lab where the sharpest minds in podcasting, advertising, and media break down the forces shaping the audio landscape—and reconstruct them in real time. We created this show in service of the Chief Audio Officer: the marketer responsible for making audio campaigns not just sound good, but drive results. For many brands, audio advertising is a highly effective secret weapon–but it can be difficult to navigate, requiring spe ...
…
continue reading
Senior correspondent Laura Ingle hosts this multi-part Fox Nation Audio podcast that examines the unsolved murder mystery of the more than ten people, many of them sex workers, found on Long Island. This FOX News Investigative Unit series explores what law enforcement is currently doing to solve the case using new technology. Listen to details from a former escort who believes she spoke directly with the Long Island Serial Killer (LISK). In exclusive bonus content, you will hear from the inv ...
…
continue reading
Entrepreneur Inspiring Stories to Help Motivate, Build, & Grow Your Successful Business with a Master Class from Entrepreneurial Thought Leaders that tell it How It Is... Millionaire Interviews is actionable advice for the (future & present) Entrepreneur, Thought Leaders, Solopreneur, Youpreneur, and Small Business Owner. The host interviews Business Founders in the Product, Service, Real Estate, and Tech industries so they can teach you from their experience. Connect with other Listeners @ ...
…
continue reading

1
HN801: Will a Natural Language Interface (NLI) Replace Your CLI?
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of needing to understand the syntax of a specific vendor’s CLI, could a language model allow network operators to use plain language to get the information they need or the... Read more »…
…
continue reading

1
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
…
continue reading

1
LIU002: Do You Need a College Degree to Succeed in IT?
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29A college degree can be a useful stepping stone into a tech career, and it certainly doesn’t hurt to have it on your resume. But do you really need that college degree to succeed in IT? Maybe, maybe not. Today’s guest is Wes Noonan, whose non-traditional path into and through a career in IT has... Read more »…
…
continue reading

1
TCG060: Rockets, Networks, and Markets With Michael Reid
1:00:45
1:00:45
Play later
Play later
Lists
Like
Liked
1:00:45Michael Reid went from studying aerospace engineering to becoming CEO at Megaport, a global network-as-a-service platform. How did he get there, and what can we learn from his journey? We walk his career path, including a pivotal role scaling ThousandEyes from 74 million to over 2.4x ARR post-acquisition, and how those experiences shaped his approa…
…
continue reading

1
NAN103: The Evolution of Multi-Cloud Networking
47:47
47:47
Play later
Play later
Lists
Like
Liked
47:47We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud podcast. He recently wrote a 5-part blog series titled ‘Goodbye, Yellow Brick Road’ that reflects on his career path, including his decision to leave a startup. We discuss the impetus... Read more »…
…
continue reading

1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading

1
HS114: In or Out? Deciding Which IT Functions to Bring In or Push Out
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41In times of major change–whether in IT or the economy–organizations should take a fresh look at their sourcing strategy. Companies outsourcing key functions need to re-examine the reasoning and scrutinize the results. The same goes for in-house functions. IT leaders need to ask: is our sourcing strategy in line with our current corporate and IT... …
…
continue reading

1
NB547: New Cisco Router Targets AI DCI; Salesforce Launches ServiceNow Competitor
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55Take a Network Break! We start with listener follow-up on security browsers, and then dive into a deep pool of Juniper vulnerabilities to pick two critical ones affecting Juniper Space. We also get an update from SonicWall that the breach of its cloud storage service affected all users of the service. Cisco announces a new... Read more »…
…
continue reading

1
TNO045: IP and Optical Integration: Automation Across Layers
1:02:17
1:02:17
Play later
Play later
Lists
Like
Liked
1:02:17LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. Th…
…
continue reading

1
HN800: Root Cause Analysis for the Entire Stack (Sponsored)
1:11:47
1:11:47
Play later
Play later
Lists
Like
Liked
1:11:47Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue. But not root cause analysis for just the networking part of the stack. The full stack. Why? Because it’s not good enough to say “it’s not the network”.... Read more »…
…
continue reading

1
IPB185: When IPv6 VPN and DNS Don’t Cooperate
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06Sometimes weirdness occurs within DNS if you’re on an IPv4 network and you connect to a dual-stack or v6-only VPN. Maybe the browser doesn’t connect, but you can still send pings, or vice versa. Is the OS getting confused about which stack and which order of interfaces to request services? Is the weird behavior being... Read more »…
…
continue reading

1
N4N040: Mock Interview for a Network Administration Job
1:03:15
1:03:15
Play later
Play later
Lists
Like
Liked
1:03:15The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who’s applying for a junior network administration role. The goal is to give Toni Mrowetz, our candidate, feedback. At the same time, we hope this helps anyone listening who might... Read more »…
…
continue reading

1
D2DO284: AI, MCP, and the Identities that Tie Them All Together
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07AI is developing at an incredible pace. With that development comes questions. For instance, how do you connect your resources to agents? How do agents connect with each other? And how do you keep it all secure? Our guest Christian Posta is here to guide us through AI, MCP, and the concept of workload identities.... Read more »…
…
continue reading

1
"Stop Apologizing": Lex Friedman on Why Podcasting Will Always Evolve and Why That's a Good Thing
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44This week on the Media Roundtable, we’re sitting down with Lex Friedman (not to be confused with Lex Fridman), one of podcasting’s original builders and a leader who’s shaped the business of podcasting since Day 1. Before launching his own consulting business, Lex played a part in nearly every major chapter of the industry, including Chief Business…
…
continue reading

1
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26By Packet Pushers
…
continue reading

1
HW062: Designing Access Points For the Enterprise
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18By Packet Pushers
…
continue reading

1
NB546: Meta Mulls GPU Startup Purchase; Indirect Prompt Injection Exacerbates AI Risks
50:42
50:42
Play later
Play later
Lists
Like
Liked
50:42By Packet Pushers
…
continue reading

1
Tech Bytes: Building a UEC-Supported AI Data Center Fabric With Nokia (Sponsored)
16:34
16:34
Play later
Play later
Lists
Like
Liked
16:34By Packet Pushers
…
continue reading

1
TNO044: Inside a Global Enterprise Data Center Network Migration (Sponsored)
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
…
continue reading

1
HN799: Multi-Homing IPv6 to Your Home Lab
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »…
…
continue reading
Starting any new endeavor is hard. That’s particularly true for a career in tech. And that’s the reason Alexis Bertholf and Kevin Nanns are launching the Life In Uptime podcast. In each episode they’ll sit down with engineers, leaders, and builders in tech to uncover the stories behind their careers to help you see how... Read more »…
…
continue reading

1
TCG059: From Source of Truth to Knowledge Graph – Rethinking Network Data
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30Network automation has a data problem. Traditional tools may hit limitations when managing complex infrastructure relationships. We explore how OpsMill’s InfraHub uses graph databases and temporal versioning to create what our guest calls “the knowledge graph of infrastructure” – enabling true version control at the database level while maintaining…
…
continue reading

1
NAN102: Practical Applications for AI in Network Automation
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joining us today is Ryan Booth; he’s built a career around network automation, giving him a unique perspective on how network engineering, operations, software development, and AI intersect. We explore the…
…
continue reading

1
Inside the 2025 Podcast Ad Playbook from Leading Brands: Whole Foods, Chime, Indeed, and Tecovas
39:35
39:35
Play later
Play later
Lists
Like
Liked
39:35Finally, some insights brand builders and performance marketers can agree on. We gathered CAOs in finance, food, jobs, and boots to share everything they’ve learned as they’ve scaled podcasting to enviable levels–and whether you’re brand or performance, you’ll benefit from their wealth of experience On The Media Roundtable, we have one of our favor…
…
continue reading

1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading

1
HS113: Bad Tech Romance: Five Signs You’re In an Abusive IT Relationship
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50Sure, some days you hate your job. But how do you know when an IT position has gone from being run-of-the-mill annoying to truly toxic? And what do you do about it? Johna Johnson and John Burke are joined by Sandy Miller, a pseudonym for a CIO at a major global company who talks about... Read more »By Packet Pushers
…
continue reading

1
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federa…
…
continue reading

1
HN798: Fortinet Offers a SOC Every Org Can Grow Into (Sponsored)
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00On today’s Heavy Networking: the Security Operations Center, or SOC. When I think of a SOC, I picture a miniature version of NASA’s mission control: lots of computers, lots of people, some big boards with lines and arrows and telemetry scrolling across the screens. I also think of SOCs as requiring a lot of gear,... Read more »…
…
continue reading

1
TNO043: Under the Manhole Cover: The Architecture of an Internet Exchange
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, s…
…
continue reading
We’re diving into another IPv6 Basics today with the topic of dual-stack, which means running the IPv4 and IPv6 protocol stacks simultaneously. We get many questions about the implications of running dual-stack, and in this episode we’ll provide answers. We start by getting a little finicky about the definition of dual-stack, and then talk about...…
…
continue reading

1
N4N039: Configuring an IPsec Tunnel
1:01:20
1:01:20
Play later
Play later
Lists
Like
Liked
1:01:20We dive back into the world of IPsec with an episode dedicated to configuring IPsec tunnels. After discussing a listener comment regarding transport mode in IPsec tunnels, Ethan Banks and Holly Metlitzky work through topics such as multi-vendor IPsec configuration, licensing, and the details of configuration and routing. Bonus material: MTU size an…
…
continue reading

1
D2DO283: Lessons Learned When a Startup Doesn’t Take Wing
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10Today we talk to Elad Ben-Israel about his former startup Wing Cloud, and the language that was built along with it, Winglang. We discuss why Eland started Wing Cloud, lessons learned about founding a start up, and what the future holds for the Winglang language. Ad Spot: Faddom Faddom helps you discover and map your... Read more »…
…
continue reading

1
NAN101: Scaling Intel’s Data Centers with Network Automation (Sponsored)
52:21
52:21
Play later
Play later
Lists
Like
Liked
52:21Transforming over 5,000 network devices across 56 data centers is no small feat. Doing that with a very small team is even more impressive. On today’s episode, sponsored by Network To Code, we talk to Greg Botts from Intel, who with his team accomplished just that. They started with YAML files and DNS records and... Read more »…
…
continue reading

1
Ad Infinitum S3E11 - When the Helmets Come Off: Kraig T. Kitchin at CAO Summit 2025
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31Want to see more clearly in podcasting? You need to hear the audio experts who’ve returned from the Summit. The world’s only podcast solely dedicated to audio ads is back! Presenting Ad Infinitum Season 3, Episode 11 - "When the Helmets Come Off: Kraig T. Kitchin at CAO Summit 2025" Host Stew Redwine (Executive Creative Director, Oxford Road ) welc…
…
continue reading

1
HW061: Cisco’s Ultra-Reliable Wireless Backhaul
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36As automation of machinery in industrial environments grows, there is a need for reliable wireless technologies to connect and control mobile assets. Mobile assets cannot tolerate dropped connections or network latency, which could jeopardize safety among other problems. Cisco’s Ultra-Reliable Wireless Backhaul is one such product that promises to …
…
continue reading

1
PP079: Rethinking the Architecture of Microsegmentation
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a workin…
…
continue reading

1
NB544: NVIDIA Buys $5 Billion of Intel Stock; Netskope Rides SASE IPO to an $8.8 Billion Valuation
26:32
26:32
Play later
Play later
Lists
Like
Liked
26:32It’s big-money deals and ever-more AI on this week’s Network Break. We start with a red alert from NVIDIA, which has rolled out a software upgrade to patch multiple bugs in its Triton Inference Server, one of which is a dangerous remote code execution vulnerability. On the news front, NVIDIA pledges a $5 billion investment... Read more »…
…
continue reading

1
TNO042: Building a Network Digital Twin for Automation and AI (Sponsored)
1:01:17
1:01:17
Play later
Play later
Lists
Like
Liked
1:01:17The digital twin is an evolving technology in the networking space. On today’s sponsored episode of Total Network Operations, we dig into details and definitions of the digital twin, how it ties into network automation and autonomy, and the power of abstraction layers. We’ll also talk about how the concepts in today’s show might influence... Read m…
…
continue reading

1
HN797: What To Do When The Business Asks for “AI”
1:07:25
1:07:25
Play later
Play later
Lists
Like
Liked
1:07:25When someone from the executive suite starts an AI initiative, what does that mean to you, the network engineer? The executive suite probably doesn’t know what their AI idea might mean for infrastructure. They might only have a vague idea of what they’re even trying to accomplish with an AI initiative. Regardless, that initiative puts... Read more …
…
continue reading

1
LIU000: Announcing Life In Uptime, a New Podcast to Get You Started on Your IT Journey
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28Life In Uptime is a brand-new podcast that explores the real journeys of the people who build and run enterprise IT. Each episode dives into the personal and professional paths that got each guest to where they are today—because the road to a career in technology isn’t one-size-fits-all. This show is for anyone wondering how... Read more »…
…
continue reading

1
TCG058: Creating the Internet Layer That Should Have Been With Avery Pennarun
51:49
51:49
Play later
Play later
Lists
Like
Liked
51:49In this deep dive episode, we explore the evolution of networking with Avery Pennarun, Co-Founder and CEO of Tailscale. Avery shares his extensive journey through VPN technologies, from writing his first mesh VPN protocol in 1997 called “Tunnel Vision” to building Tailscale, a zero-trust networking solution. We discuss how Tailscale reimagines the …
…
continue reading

1
NAN100: A Retrospective On 100 Episodes of Network Automation Nerds
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56Network Automation Nerds has reached a special milestone: episode 100! Eric Chou looks back on 5 years of conversations with network automation pioneers, practitioners, and visionaries. Drew Conry-Murray from the Packet Pushers joins Eric, along with online guest Ioannis Theodoridis, to find out why Eric started the podcast, his goals for all these…
…
continue reading

1
IPB183: Measuring IPv6 and IPv6 Statistics
27:21
27:21
Play later
Play later
Lists
Like
Liked
27:21Today we talk about measuring IPv6 and IPv6 statistics. We talk about why it’s useful to measure IPv6, how to track v6 deployment initiatives, and tools to help with your measurements. Episode Links: Google IPv6 – Google IPv6 Global Statistics Dashboard IPv6 Enabled – Hexabuild Episode Transcript: This episode was transcribed by AI and lightly... R…
…
continue reading

1
“Radio is a Cucaracha”: How Brands are Making the Most of Tried-and-True Reach — From the CAO Summit
36:19
36:19
Play later
Play later
Lists
Like
Liked
36:19This week on the Media Roundtable, we’re taking you back to the CAO Summit for a tactical conversation on one of media’s most resilient channels: radio. Guest moderator and radio legend Kim Komando leads a panel featuring Nick Macco (Legacybox), Mike Janigian (DraftKings), and Rion Swartz (brand-side growth leader, previously at LegalZoom) on why w…
…
continue reading

1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
continue reading

1
HS112: Standardizing NaaS Service Definitions
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Network-as-a-Service (NaaS) promises enterprises the ability to set up and configure connectivity and network security with a couple of clicks. But for NaaS to truly transform enterprise networking, one thing has been missing: standards. Enter Mplify (formerly the Metro Ethernet Forum), a non-profit focused on standardizing NaaS service definitions…
…
continue reading

1
N4N038: Well Actually 02 – OSPF Multi-Area and LSA Types
49:57
49:57
Play later
Play later
Lists
Like
Liked
49:57We got some interesting listener feedback from our series on OSPF, so today’s N Is for Networking is another “Well actually” episode where we dig into that feedback. In particular, we’ll cover a defense of OSPF multi-area deployments, and dig into OSPF LSA types. Episode Links: OSPF Basics – N Is For Networking Episode 38... Read more »…
…
continue reading

1
NB543: Splunk, ServiceNow Announce AI Agents; Data Center Spending Runs Amok
29:41
29:41
Play later
Play later
Lists
Like
Liked
29:41Take a Network Break! We start with a listener correction on Cisco’s history of wireless certifications, then dig into a couple of red alerts on Microsoft Defender and a backdoor in Outlook. On the news front, Cisco announces new AI agents and SoC packages for Splunk; F5 spends $180 million to buy an AI security... Read more »…
…
continue reading

1
TNO041: From Ansible to AI: Jeremy Schulman on the Evolution of Network Automation
1:12:38
1:12:38
Play later
Play later
Lists
Like
Liked
1:12:38Jeremy Schulman has been working at network automation for much of his professional life. On today’s Total Network Operations, host Scott Robohn talks with Jeremy about his ongoing quest to get the network engineering bottleneck out of production. They discuss the early days of network automation when engineers tried to adopt tools from the compute…
…
continue reading

1
HN796: The Why and How of Making Your Infrastructure Quantum-Safe (Sponsored)
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Your production IT operations are almost certainly using cryptography libraries that are not quantum-safe, and the time to begin planning a cryptography overhaul is now. But this is likely to be a daunting project because it touches everything: clients, servers, apps, network devices, middleboxes, and so on. Daunting, but doable. We talk with Richu…
…
continue reading