BLOG

Insights empowering your cloud and network

Top picks

Thumbnail of an article about Webpack 3 to webpack 4: tips on migrating
SOFTWARE DEVELOPMENT

Webpack 3 to webpack 4: tips on migrating

Having heard a lot about speed improvements, we recently migrated from webpack 3 to webpack 4. The results have been astonishing: our average build time improved by 30%, and hot-reloading by 83%! This article covers the following topics:1. The key benefits of migration2. How webpack 3 compares to webpack 4 in terms of build time3. How to effectively migrate from webpack 3 to webpack 44. The pitfalls to avoidI’ll start by saying our project is humongous, so builds are pretty slow. Our hot-update recently got so slow, in fact, that we decided something had to be done.
Thumbnail of an article about Five cloud challenges solved by Software Defined Networking (SDN)
NETWORKS
CLOUD

Five cloud challenges solved by Software Defined Networking (SDN)

As purchasing more and more gear becomes an outdated way to upscale, companies outsource computing power from a the cloud. However, organizations struggle to combine their physical servers and cloud resources into a single efficient, integrated network. This article runs through some of the main concerns about the cloud. It addresses how SDN technology solves them and how it can support a company in managing its cloud services and internal resources. Empowering old-style on-prem infrastructure with SDNs allows companies to tackle their most pressing challenges in building a hybrid cloud.
Thumbnail of an article about CI/CD of CI/CD — how to avoid technical debt while delivering cutting edge software
OPERATIONS

CI/CD of CI/CD — how to avoid technical debt while delivering cutting edge software

When a company’s core business is delivering software, the tools it chooses to use are crucial to maintaining efficiency. Thus there is no reason to deliver CI/CD software in a model other than CI/CD. After we deliver shiny new CI/CD software to our clients, the work is hardly done. The software ages and the technical debt runs up. According to Deloitte, the typical application comes with $3.61 worth of technical debt per line of code. That debt accounts for every fast-but-imperfect patch or app architecture that ages and also makes innovations hard to apply.
Thumbnail of an article about Debugging faultily inherited file handles on Microsoft Windows
NETWORKS
SOFTWARE DEVELOPMENT

Debugging faultily inherited file handles on Microsoft Windows

Some time ago we fixed issues with multi-thread building in SConscripts. Since then, we have encountered strange, flaky compilation errors occurring randomly in about 5% of our builds. We couldn’t leave it that way - our Windows CI is used by many developers working on multiple parts of the system and we must ensure that it is 100% stable. We all know those pesky flaky bugs that won’t let us sleep peacefully. A menace to developers, they are happening once a week and are impossible to catch and debug.
Thumbnail of an article about Legacy code: a time bomb for your business?
OPERATIONS

Legacy code: a time bomb for your business?

Due to a technical failure, Delta Airlines had to cancel 2,300 flights. The problem was neither in the planes nor the company’s infrastructure. The reason for the chaos, clients' disappointment and the subsequent cut in profit guidance for the third quarter was simply aging software. This article will explain: What legacy code is? Why it is presenting companies with such a challenge? How we solve such problems? The problem with aging software and legacy apps afflicts every industry, from banking to insurance to telecommunications.

Explore tech-packed content

Thumbnail of an article about Introducing SONiC-DASH for enhanced network programmability

Introducing SONiC-DASH for enhanced network programmability

on Apr 15, 2024
Thumbnail of an article about The crucial role of machine learning metadata and its influence on content embeddings

The crucial role of machine learning metadata and its influence on content embeddings

on Apr 9, 2024
Thumbnail of an article about Frontend security: API’s key risks and how to mitigate them

Frontend security: API’s key risks and how to mitigate them

on Apr 3, 2024
Thumbnail of an article about IIFE: a (wrongfully?) forgotten JavaScript pattern

IIFE: a (wrongfully?) forgotten JavaScript pattern

on Mar 28, 2024
Thumbnail of an article about Introducing SONiC-DASH for enhanced network programmability

Introducing SONiC-DASH for enhanced network programmability

on Apr 15, 2024
Thumbnail of an article about The crucial role of machine learning metadata and its influence on content embeddings

The crucial role of machine learning metadata and its influence on content embeddings

on Apr 9, 2024
Thumbnail of an article about Frontend security: API’s key risks and how to mitigate them

Frontend security: API’s key risks and how to mitigate them

on Apr 3, 2024
Thumbnail of an article about IIFE: a (wrongfully?) forgotten JavaScript pattern

IIFE: a (wrongfully?) forgotten JavaScript pattern

on Mar 28, 2024
Thumbnail of an article about Introducing SONiC-DASH for enhanced network programmability

Introducing SONiC-DASH for enhanced network programmability

on Apr 15, 2024
Thumbnail of an article about The crucial role of machine learning metadata and its influence on content embeddings

The crucial role of machine learning metadata and its influence on content embeddings

on Apr 9, 2024
Thumbnail of an article about Frontend security: API’s key risks and how to mitigate them

Frontend security: API’s key risks and how to mitigate them

on Apr 3, 2024
Thumbnail of an article about IIFE: a (wrongfully?) forgotten JavaScript pattern

IIFE: a (wrongfully?) forgotten JavaScript pattern

on Mar 28, 2024

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix