It always takes longer to find a problem than it should. Moving through the troubleshooting process often feels like swimming in molasses—it’s never fast enough or far enough to get the application back up and running before that crucial deadline. The “swimming in molasses effect” doesn’t end when the problem is found out, either—repairing the problem requires juggling a thousand variables, most of which are unknown, combined with the wit and sagacity of a soothsayer to work with vendors, code releases, and unintended consequences.
It’s enough to make a network engineer want to find a mountain top and assume an all-knowing pose—even if they don’t know anything at all.
The problem of taking longer, though, applies in every area of computer networking. It takes too long for the packet to get there, it takes to long for the routing protocol to converge, it takes too long to support a new application or server. It takes so long to create and validate a network design change that the hardware, software and processes created are obsolete before they are used.
Why does it always take too long? A short story often told to me by my Grandfather—a farmer—might help.
One morning a Continue reading

What would a totally new search engine architecture look like? Who better than Julien Lemoine, Co-founder & CTO of Algolia, to describe what the future of search will look like. This is the first article in a series.
Search engines, and more generally, information retrieval systems, play a central role in almost all of today’s technical stacks. Information retrieval started in the beginning of computer science. Research accelerated in the early 90s with the introduction of the Text REtrieval Conference (TREC). After more than 30 years of evolution since TREC, search engines continue to grow and evolve, leading to new challenges.
In this article, we look at some key milestones in the evolution of search engine architecture. We also describe the challenges those architectures face today. As you’ll see, we grouped the engines into four architecture categories. This is a simplification, as there are in reality a lot of different engines with various mix of architectures. We did this to focus our attention on the most important characteristics of those architectures.
oday's Tech Bytes podcast discusses how to get visibility into, and context for, all the IoT devices connecting wirelessly to your network. Our sponsor is Aruba, and we explore Aruba’s Edge Services Platform, or ESP, and how it delivers hyper-awareness of your IoT environment.
The post Tech Bytes: Get IoT Context And Control With Aruba ESP (Sponsored) appeared first on Packet Pushers.
Software – and the data it produces – is the engine that is driving IT these days. …
Kubernetes Expands From Containers To Infrastructure Management was written by Jeffrey Burt at The Next Platform.
What bit of technology got us through the pandemic, was available for scaling up at just the right time to keep a pretty sizeable chunk of our economy working, redefined education on a moment’s notice, and now is redefining for the world the entire notion of work? …
Thought Experiment: How Did Zoom’s Infrastructure Keep Us Connected? was written by Mark Funk at The Next Platform.

Restoring Internet in Cuba; U.S. community broadband networks; no to spyware; encryption problems in Ukraine.
The post The Week in Internet News: Biden Looks for Ways to Restore Internet in Cuba appeared first on Internet Society.


Today, we are excited to share that Cloudflare and Accenture Federal Services (AFS) have been selected by the Department of Homeland Security (DHS) to develop a joint solution to help the federal government defend itself against cyberattacks. The solution consists of Cloudflare’s protective DNS resolver which will filter DNS queries from offices and locations of the federal government and stream events directly to Accenture’s analysis platform.
Located within DHS, the Cybersecurity and Infrastructure Security Agency (CISA) operates as “the nation’s risk advisor.”1 CISA works with partners across the public and private sector to improve the security and reliability of critical infrastructure; a mission that spans across the federal government, State, Local, Tribal, and Territorial partnerships and the private sector to provide solutions to emerging and ever-changing threats.
Over the last few years, CISA has repeatedly flagged the cyber risk posed by malicious hostnames, phishing emails with malicious links, and untrustworthy upstream Domain Name System (DNS) resolvers.2 Attackers can compromise devices or accounts, and ultimately data, by tricking a user or system into sending a DNS query for a specific hostname. Once that query is resolved, those devices establish connections that can lead to malware downloads, phishing websites, Continue reading
In this episode Rick and Melchior invited Rolf Schaerer from Pensando Systems and ask him all how Pensando redefines the Netwok Server Edge.
“A New Way of Thinking About Next-Gen Cloud Architectures” leveraging a custom, programmable P4 processor Pensanso refers to as Capri. Capri is optimized to execute a software stack delivering cloud, compute, network, storage, and security services at cloud scale. Capri is easily installed in any standard server via the Pensando Distributed Services Card (DSC). The DSC provides software-defined services at the server edge, eliminating an assortment of discrete appliances throughout the data center and simplifying IT operations.

Hello my friend,
Talking to some our partners, they mentioned that they are extensively using the unit tests python libraries for the development of the software in Python. They are creating their applications in Django framework; therefore, they are using a built-in Django testing library, which is based on Python’s standard unittest. We start looking, how we can use that ourselves…
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
What do we, network engineers, do to quickly check that our network devices are reachable? We do ping. However, is that really good enough to check that your devices are OK? The one could say: I don’t even use a ping for that, as I rely on my NMS. This is also a good answer. In the same time, though, the vast majority of the NMS doesn’t contain all the details of network devices configuration and their operational data: e.g. all the details of OSPF and Continue reading
Enums group a related number of values and store the values internally as integers. Enums are good to use when the number of values are not too big. Considerations Enums are a type safe alternative to Symbols. It is recommended to use Enums whenever possible and only use Symbols for an...continue reading
Strings Strings in Crystal are are declared with double quotes (""). Strings are stored as as sequence of UTF-8 encoded characters. Strings are immutable. Symbols Symbols in Crystal are declared by prefixing a colon (:) to a variable. Every instance of a Symbol is the same...continue reading