TCP Protective Load Balancing coming to Linux Kernel 6.2

TCP Protective Load Balancing coming to Linux...

‏التالي

My new book - Root cause, Stories from two decades of backend bugs

I wrote a new book that has been in the works for years. It is called Root Cause, and it is for those who enjoy the art of backend engineering.Early in my career, 20 years ago, I built backend and database applications without fully grasping their inner mechanics. Performance iss ...  عرض المزيد

5 Backend Design Patterns for Managing Threads and Sockets

In this video I introduce 5 different design patterns for building backend applications. Each mode explains how a socket listener is established, a connections are established and how threads and connections are managed to read, write and process requests. 

‏حلقات موصى بها

IPB143: Are We Stuck With Dual-Stack Forever?
IPv6 Buzz

These days, most network devices can speak both IPv4 and IPv6. A dual-stack approach can smooth the transition from one protocol to the other because organizations can get comfortable with IPv6 without having to make a hard cutover. However, they may get so comfortable that they ...  عرض المزيد

TCP & UDP
Go Time: Golang, Software Engineering

The internet wouldn’t exist as we know it if it weren’t for TCP and UDP, yet many developers don’t quite understand the technology powering the web. In this episode we talk with Adam Woodbeck, author of Network Programming with Go, to learn about TCP and UDP; what they are, how t ...  عرض المزيد

HN727: Kubernetes Networking Essentials
Heavy Networking

Where there are containers, there is networking. Today we dig into the networking that underlies Kubernetes, the open source orchestration platform for container-based applications. Our guest Karim El Jamali takes us through the essential concepts: Nodes, pods, clusters, CNIs, vi ...  عرض المزيد

It's still possible to find ways to break out. [Research Saturday]
CyberWire Daily

Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a ...  عرض المزيد