We believe that service meshes will be absolutely central to the future of networking. When networks only connected physical machines, we needed…
3
1
One of the secrets of writing that I’ve come to appreciate over the years is knowing what to leave out. This starts with deciding what topics are…
3
3
How The “Conservation of Weirdness” Will Impact Cryptography. Cryptography depends on the supposed difficulty of finding the prime factors of a large…
5
Looking back on the 2022 P4 Workshop I had two big takeaways: the first narrowly focuses on the proposed roadmap for P4, while the second looks at the…
3
3
It was a milestone week at Systems Approach as we published TCP Congestion Control: A Systems Approach in both print and ebook formats. You should be…
1
3
While working to complete the Monitoring and Telemetry chapter of our Edge Cloud Operations book, I couldn’t help but notice all the hype on the…
2
APIs (application programming interfaces) are no longer just a technical detail of interest to computer scientists. Banks, for example, are launching…
6
1
One of the things we try to do in all of our books is highlight the system design principles illustrated by specific technologies. In our main book…
7
This week we’re turning our attention to the possible decentralization of the “mobile packet core”, which promises a significant departure from how…
6
1
Whatever Came of the NFV Initiative? Since our recent posts have been retracing the history (and recounting the lessons) of SDN, it seems like a good…
4
We’ve been involved in some exciting moments as we’ve watched the networking landscape over the last forty-or-so years. It’s often only with hindsight…
4
Open source software has been the subject of many essays, of which Eric Raymond’s insights in The Cathedral and The Bazaar still serves as a…
3
1