PACKET CAPTURE / Week of March 10-14, 2025

FYI 

JOB ALERTS

Current postings from the Packet Pushers Slack Group

NEW PODCASTS

EP 517 | MARCH 10, 2025

TSMC Pledges $165 Billion for US Chip Manufacturing; Will the CHIPS Act Get Axed?

Take a Network Break! We discuss SolarWinds' acquisition of Squadcast and how it fits into the SolarWinds portfolio, Aviatrix's new Kubernetes firewall, and the geopolitical ramifications of TSMC adding $100 billion to the $65 billion already pledged to build chip manufacturing capabilities in the United States, a Trump threat to kill the CHIPS Act, financial results, and more tech news. | LISTEN NOW

SPONSORED | MARCH 10, 2025

How Internet Synthetic Transactions Boost App Performance Visibility (Sponsored)

Today on the Tech Bytes podcast we talk about Internet Performance Monitoring, or IPM, with sponsor Catchpoint. Catchpoint provides visibility across the full Internet Stack to help you understand the performance of your SaaS and cloud apps, WAN and branch connections, and more. We’ll talk about how Catchpoint can enrich network monitoring with synthetic transactions that provide critical visibility into application performance from the user’s perspective. | LISTEN NOW

EP 097 | MARCH 11, 2025

Build A Strategy, Not Just A Project Plan

IT teams too often wrap a strategy statement around a basket of projects already in progress or known to be coming, rather than defining a strategy and then letting it spawn, guide, or absorb projects. On today's Heavy Strategy we discuss whether IT teams have any alternative to this approach, given how much gets "thrown over the wall" and into their laps. We share ideas on how to build a technology strategy properly either way, based on sound technology principles dictated by overall corporate strategy. | LISTEN NOW

EP 053 | MARCH 11, 2025

Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)

owtie Security aims to provide fast, resilient network access while also incorporating zero trust network access, a secure Web gateway, CASB, and more. It does this without the need to run all your traffic through cloud PoPs. On today's Packet Protector, sponsored by Bowtie, we dig into how Bowtie works, its use of agents and controllers, how it manages and enforces policies, how it positions itself against competitors in the SASE market, and more. | LISTEN NOW

EP 087 | MARCH 12, 2025

Modular Network Management with Slurp’it and Netpicker

Today's Network Automation Nerds podcast explores network management with Wim Gerrits and Pieter van Os, co-founders of Slurp’it and Netpicker. These tools aim to simplify network inventory and discovery, and ensure compliance and security. We talk about what drove them to build these tools, what problems they solve, and how they fit into the broader fields of network management and automation. We also talk about entrepreneurship, the challenges of building products, and more. | LISTEN NOW

EP 017 | MARCH 13, 2025

Routing Fundamentals

On today’s N Is For Networking, we explore the fundamentals of routing. We explain the concepts of routers, routing tables, and routing protocols, and discuss why it's important to have a firm grasp of these concepts before you tackle advanced topics such as VXLAN and EVPN. Today’s bonus material is a peek into the role of routing protocols such as BGP and OSPF. | LISTEN NOW

EP 020 | MARCH 14, 2025

Automating Network Operations with Juniper Mist (Sponsored)

Mist AI is a key part of Juniper’s AI-Native Networking Platform to simplify operations and optimize user experiences across wired and wireless networks. On today’s sponsored show, we explore the evolution of network operations and talk about the integration of AI and automation in the Juniper Mist platform. We also look how Juniper has extended Mist's wireless-centric approach to become a comprehensive application across multiple network domains. Plus, we dive into the new EX4000 line of switches and explore the operational benefits of AI-driven automation, including proactive issue detection and simplified device onboarding. | LISTEN NOW

EP 772 | MARCH 14, 2025

Measuring Users’ Digital Experience with Catchpoint Internet Performance Monitoring (Sponsored)

With more and more applications hosted in the cloud and more employees working remotely, organizations are turning to Internet Performance Monitoring (IPM) to help them identify and troubleshoot issues that traditional network monitoring can't see. Sponsor Catchpoint's IPM offering includes detailed end-to-end path monitoring--even for network segments you don’t own. We dive into how Catchpoint measures network and application performance, how it handles the new Internet L4S standard and explicit congestion notification (ECN) bleaching, the impact of IPv6 deployments, the role of BGP monitoring in IPM, and more. | LISTEN NOW

LATEST BLOG POSTS

ETHAN BANKS | MARCH 10, 2025

WayFi Wireless Provides Seamless Cellular Coverage Via Wi-Fi Passpoint

If you've ever priced a cellular radio Digital Amplification System (DAS) to improve the cellular coverage in your building, you likely struggled with the cost. I recently met with WayFi Wireless to learn about their solution that obviates the need for a DAS, and does so without spending DAS money. How? By using the Wi-Fi system you already have to extend cellular coverage.

Now...wait a minute. Cellular tech and Wi-Fi tech are different things. Cellular and Wi-Fi radios are different. Authentication schemes are different. The notion of a subscriber is different. So how can Wi-Fi be used to improve cellular service? The answer is Passpoint, a Wi-Fi technology that enables seamless handoff for a cellular subscriber to a Wi-Fi network. | READ NOW

DREW CONRY-MURRAY | MARCH 12, 2025

Worried About Supply Chain Attacks? Karambit Hunts for Software Behaving Badly

Software supply chain attacks attempt to insert malicious capabilities into commercial or open-source software that can later be executed by attackers. The canonical example is SolarWinds, in which attackers compromised SolarWinds' development pipeline and inserted a backdoor into a software update of the company’s widely deployed Orion software. Customers that installed the update were then vulnerable to intrusion.

Karambit tackles software supply chain risks by analyzing commercial and open-source software for indicators of malicious behavior. It can also compare software updates over time to look for changes that may point to unwanted or unexpected behavior, such as detection evasion techniques, unexpected network connections, and other indicators. | READ NOW