Blog>>Deep dive

BLOG / Deep dive

Thumbnail of an article about A guide to using OpenTelemetry Operator for Kubernetes
OBSERVABILITY
CLOUD

A guide to using OpenTelemetry Operator for Kubernetes

Observability is a key part of modern cloud computing. OpenTelemetry helps by automatically keeping track of how different parts of your system communicate. Think of it like a dashboard for all your microservices. One standout feature? Auto-instrumentation. It does a lot of the setup work for you. But how do you use OpenTelemetry in Kubernetes? That's where the OpenTelemetry Operator comes in.
Thumbnail of an article about Private Slack Chatbot: an integration of corporate resources and large language models (LLMs)
DATA

Private Slack Chatbot: an integration of corporate resources and large language models (LLMs)

Ever since the debut of ChatGPT, large language models have taken the limelight. Their breadth of knowledge is nothing short of remarkable. From drafting emails on our behalf to assisting in code development, these models showcase extensive general knowledge. Yet, a notable limitation is their unfamiliarity with specific details related to our companies, such as sensitive documents, company policies, and the like. The idea of interacting with our personal documents through such models is undoubtedly intriguing.
Thumbnail of an article about Cypress BDD integration for efficient testing
QUALITY ASSURANCE

Cypress BDD integration for efficient testing

Behavior-driven development (BDD) is a software development methodology that aims to bridge the gap between business stakeholders and technical teams by emphasizing collaboration and communication. It encourages the creation of human-readable scenarios that describe the desired behavior of a system from the user's perspective. In this article, we explore how integrating Cypress with Cucumber and BDD practices can enhance the testing process by promoting better collaboration, understanding, and documentation of application behavior from a user perspective.
Thumbnail of an article about Microservices Security Monitoring: ensuring optimal protection and performance
OBSERVABILITY
SOFTWARE DEVELOPMENT

Microservices Security Monitoring: ensuring optimal protection and performance

In the digital age, the security of microservices has taken center stage. As businesses pivot towards microservices architectures, it becomes crucial to address the security challenges that arise with their popularity. However, identifying security threats isn’t possible without adequately designed and continuously carried monitoring. Read this article and join us as we delve into the significance of microservices security monitoring, exploring key strategies and tools that enable organizations to maintain the integrity and resilience of their microservices-based applications.
Thumbnail of an article about A guide to React functional components with TypeScript
SOFTWARE DEVELOPMENT

A guide to React functional components with TypeScript

This article explores various ways of typing React functional components with TypeScript, starting from basic examples and moving on to more sophisticated use cases. Read the article to discover examples of typing components, including using generic types along with dependency injection. TypeScript is a statically typed superset of JavaScript that adds a powerful type system to the language, enabling developers to catch type-related errors at compile time and enhance code quality. It has become a popular tool among frontend developers and for good reason.
Thumbnail of an article about Exploring the potential of Behavior-Driven Development in software quality
SOFTWARE DEVELOPMENT
QUALITY ASSURANCE

Exploring the potential of Behavior-Driven Development in software quality

In the rapidly evolving landscape of software development methodologies, Behavior-Driven Development (BDD) stands out as a powerful approach that bridges the gap between technical implementation and user expectations. It emerges as a robust methodology that effectively closes the divide between intricate technical implementations and the often elusive realm of user expectations. This article dives into the foundational principles of BDD. It describes the mechanics of BDD and its transformative potential in enhancing the overarching quality of software products.
Thumbnail of an article about Redux and NgRx forms for optimizing form state management
SOFTWARE DEVELOPMENT

Redux and NgRx forms for optimizing form state management

Have you ever wondered if keeping the form state in Redux makes any sense? In programming, it is often said that the main questions can be answered with the famous phrase, "it depends." Based on my experience, I would agree: the answer truly depends on the specific situation. However, I would like to present and describe certain cases in which it is worth implementing the form state with NgRx forms. Additionally, I will highlight cases that are not worth implementing and provide a bonus solution, though a highly adverse one.
Thumbnail of an article about IPsec vs. OpenVPN — what are the differences?
NETWORKS

IPsec vs. OpenVPN — what are the differences?

Quick answer: IPsec is a suite of secure network protocols that are based on open IETF standards and OpenVPN is an open-source protocol that is used by an application with the same name. In other words, IPSec is a framework but OpenVPN is an end-user solution. It doesn’t follow that OpenVPN is worse than IPsec. If OpenVPN as a solution fulfills your requirements it could be the best choice for you. The strength of IPsec lies in three words: open IETF standards. By meeting these standards, two different implementations from different vendors can successfully operate together in the most secure way without having a single common line of code.
Thumbnail of an article about Golang code refactoring: Best practices and a practical use case
SOFTWARE DEVELOPMENT

Golang code refactoring: Best practices and a practical use case

Anyone working as a software engineer has experienced diving into existing code written by another person or team. Despite many articles, courses, and blog posts that emphasize the need to write clean and tested code, the reality never really lives up to the idealistic picture presented to us. Inexperience and deadlines, among many other reasons, can leave code repositories with suboptimal documentation, resulting in a constant need for refactoring and a growing to-do list. In this blog post, I would like to invite you to take a peek at the ongoing development of one such repository my team has inherited.
Thumbnail of an article about Network devices benchmarking methodology — RFC 2544 performance testing
QUALITY ASSURANCE
NETWORKS

Network devices benchmarking methodology — RFC 2544 performance testing

Networking devices are complex and characterizing their performance is not easy. One must not judge performance based only on the number and type of ports. On the other hand, the performance figures that can be found in marketing materials may not be conclusive. Therefore, some while ago, the effort was made to create a unified benchmarking methodology to produce reliable, repeatable and comparable results. In this short article we’ll describe the basic performance metrics of networking devices and the methodology used to measure them.
arrow
12...789...1920

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix