Why is IPv6 so much more complicated than IPv4? Could a newer version such as IPv8 be the solution? Guest Brian Carpenter joins our hosts to explain that many of IPv6’s complications are mathematical necessities. They point out that IPv6 has a 30 year head start on any IPv8 proposal that would struggle with many... Read more »
N4N055: A Wired NAC Walkthrough
14/05/2026 | 1h 15 mins.
Today’s topic is Network Access Control (NAC) for a wired network. To help walk us through it all is Jennifer “JJ” Jabbusch, a network security architect, public speaker, book author, and co-host of the Packet Protector podcast. JJ and our hosts break down the terms and protocols behind NAC, and explain why the architecture was... Read more »
D2DO302: Not Just Brains in Jars: The Human Psychology of Developers
13/05/2026 | 47 mins.
Ned and Kyler are joined by Dr. Cat Hicks to discuss her new book “The Psychology of Software Teams.” They talk about software development from a psychological perspective, including how negative stereotypes of developers can lead to them being treated simply as “brains in jars” in toxic environments. They also point out the pitfalls of... Read more »
NAN122: From Anxiety to Empowerment: Building Confidence into Machine‑Speed Network Updates (Sponsored)
13/05/2026 | 1h 2 mins.
Network teams are being asked to move faster than ever as automation and AI-driven workflows increase the volume and frequency of network changes. In this episode, sponsored by Cisco, we explore how modern network operating systems make zero-downtime, zero-stress updates possible, even at machine speed. We’ll break down three key capabilities: Atomic Config Replace (ACR),... Read more »
PP109: ThreatLocker Enforces Zero Trust With Strict Application Control (Sponsored)
12/05/2026 | 44 mins.
ThreatLocker takes an opinionated approach to Zero Trust. The company, our sponsor for today’s episode, starts with application control. It uses endpoint software that runs on PCs and servers to allow or deny applications to run. It can also monitor and control the behavior of allowed applications. ThreatLocker has extended its platform to include network... Read more »