BLOG

Insights empowering your cloud and network

Top picks

Thumbnail of an article about Exploring the potential of Behavior-Driven Development in software quality
SOFTWARE DEVELOPMENT
QUALITY ASSURANCE

Exploring the potential of Behavior-Driven Development in software quality

In the rapidly evolving landscape of software development methodologies, Behavior-Driven Development (BDD) stands out as a powerful approach that bridges the gap between technical implementation and user expectations. It emerges as a robust methodology that effectively closes the divide between intricate technical implementations and the often elusive realm of user expectations. This article dives into the foundational principles of BDD. It describes the mechanics of BDD and its transformative potential in enhancing the overarching quality of software products.
Thumbnail of an article about Redux and NgRx forms for optimizing form state management
SOFTWARE DEVELOPMENT

Redux and NgRx forms for optimizing form state management

Have you ever wondered if keeping the form state in Redux makes any sense? In programming, it is often said that the main questions can be answered with the famous phrase, "it depends." Based on my experience, I would agree: the answer truly depends on the specific situation. However, I would like to present and describe certain cases in which it is worth implementing the form state with NgRx forms. Additionally, I will highlight cases that are not worth implementing and provide a bonus solution, though a highly adverse one.
Thumbnail of an article about IPsec vs. OpenVPN — what are the differences?
NETWORKS

IPsec vs. OpenVPN — what are the differences?

Quick answer: IPsec is a suite of secure network protocols that are based on open IETF standards and OpenVPN is an open-source protocol that is used by an application with the same name. In other words, IPSec is a framework but OpenVPN is an end-user solution. It doesn’t follow that OpenVPN is worse than IPsec. If OpenVPN as a solution fulfills your requirements it could be the best choice for you. The strength of IPsec lies in three words: open IETF standards. By meeting these standards, two different implementations from different vendors can successfully operate together in the most secure way without having a single common line of code.
Thumbnail of an article about SmartNIC vs. NIC: what is the difference?
SOFTWARE DEVELOPMENT
NETWORKS

SmartNIC vs. NIC: what is the difference?

Our everyday life is full of networking devices and applications. When we video conference at work or watch a new movie on a streaming service at home, we barely even think about how much data needs to be transferred to ensure their correct function. We use our mobile devices with high-speed Internet access and take that for granted. But underneath the efficient work of online applications lies the stable functioning of enormous data centers and telecommunication infrastructure. Since the amount of data that needs to be processed grows every day, we keep demanding more and more processing capabilities from the networking infrastructure.
Thumbnail of an article about Golang code refactoring: Best practices and a practical use case
SOFTWARE DEVELOPMENT

Golang code refactoring: Best practices and a practical use case

Anyone working as a software engineer has experienced diving into existing code written by another person or team. Despite many articles, courses, and blog posts that emphasize the need to write clean and tested code, the reality never really lives up to the idealistic picture presented to us. Inexperience and deadlines, among many other reasons, can leave code repositories with suboptimal documentation, resulting in a constant need for refactoring and a growing to-do list. In this blog post, I would like to invite you to take a peek at the ongoing development of one such repository my team has inherited.
Thumbnail of an article about What is micro-frontend architecture? A comprehensive overview
SOFTWARE DEVELOPMENT

What is micro-frontend architecture? A comprehensive overview

Modern customers have more requirements for a web app than ever before. With the wide choice of mobile and web applications that exists today, it is not enough for an application to simply fulfill its functions as advertised. It also has to be highly available, scalable, and fast, and updates and new features have to come out regularly, and without a hitch. For quite some time already, creating a successful modern web application has meant overcoming the limitations of a monolithic backend. One of the most popular approaches for that is using microservices for your backend development.
Thumbnail of an article about Trunk-based development: best practices and strategies
SOFTWARE DEVELOPMENT

Trunk-based development: best practices and strategies

All development teams strive for an agile, flexible, and efficient software development process. There are many ways to achieve it. Trunk-based development is one of the more modern approaches that is gaining attention. Let’s take a closer look at what it is, how it works, and what benefits it can bring your team. Trunk-based development is a management practice. It is a source-control branching model focusing on a single branch of code called the trunk. Trunk-based development aims to keep the trunk ready for deployment at all times.
Thumbnail of an article about SRE vs. DevOps — what’s the difference?
OPERATIONS

SRE vs. DevOps — what’s the difference?

DevOps and Site Reliability Engineering (SRE) are two approaches in modern software development and operations. DevOps is a methodology that embraces lean and agile principles, focusing on continuous delivery and automation throughout the software development life cycle. This approach enables frequent releases and efficient software development and deployment processes. In 2003 SRE emerged as a solution designed to support the construction of large-scale applications. Today, SRE involves a team of experts with development backgrounds, applying engineering practices to tackle common challenges in production systems.
arrow
12...678...3334

Explore tech-packed content

Thumbnail of an article about Exploring Spotify’s Backstage for streamlined software development

Exploring Spotify’s Backstage for streamlined software development

on May 10, 2024
Thumbnail of an article about The Power of Automated Network Provisioning

The Power of Automated Network Provisioning

on May 6, 2024
Thumbnail of an article about Testing network configurations with free traffic generators

Testing network configurations with free traffic generators

on Apr 30, 2024
Thumbnail of an article about Traffic Generators in Network Device Testing

Traffic Generators in Network Device Testing

on Apr 26, 2024
Thumbnail of an article about Exploring Spotify’s Backstage for streamlined software development

Exploring Spotify’s Backstage for streamlined software development

on May 10, 2024
Thumbnail of an article about The Power of Automated Network Provisioning

The Power of Automated Network Provisioning

on May 6, 2024
Thumbnail of an article about Testing network configurations with free traffic generators

Testing network configurations with free traffic generators

on Apr 30, 2024
Thumbnail of an article about Traffic Generators in Network Device Testing

Traffic Generators in Network Device Testing

on Apr 26, 2024
Thumbnail of an article about Exploring Spotify’s Backstage for streamlined software development

Exploring Spotify’s Backstage for streamlined software development

on May 10, 2024
Thumbnail of an article about The Power of Automated Network Provisioning

The Power of Automated Network Provisioning

on May 6, 2024
Thumbnail of an article about Testing network configurations with free traffic generators

Testing network configurations with free traffic generators

on Apr 30, 2024
Thumbnail of an article about Traffic Generators in Network Device Testing

Traffic Generators in Network Device Testing

on Apr 26, 2024

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix