Remove DNS Remove Engineering Remove Protocol
article thumbnail

EP143: DNS Record Types You Should Know

ByteByteGo

This week’s system design refresher: 8 Most Important System Design Concepts You Should Know (Youtube Video) DNS Record Types You Should Know Polling Vs Webhooks API Vs SDK! Here are the 8 most commonly used DNS Record Types. They are used for websites and services that support the IPv6 protocol.

DNS 130
article thumbnail

EP141: How to Ace System Design Interviews Like a Boss?

ByteByteGo

Proactive performance monitoring using New Relic AI (Sponsored) Managing complex technology stacks and ensuring continuous uptime are critical challenges for modern engineering teams. Used in protocols such as HTTP, FTP, and SMTP. Used in DNS querying and CDNs. Over to you: What else would you add to the process? The solution?

Unicast 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

NPM, encryption, and the challenges ahead: Part 1 of 2

Kentik

Some NPM vendors started pairing DNS lookup records with flow data in order to separate business applications from non-business applications hosted on the same IP address. The problem is that many companies have several DNS servers spread out in far-reaching locations, and not all DNS vendors allow access to the logs.

article thumbnail

EP147: The Ultimate API Learning Roadmap

ByteByteGo

The zero flakes guarantee cuts out false alarms and wasted engineering hours. Here’s a roadmap that covers the most important topics: Introduction to APIs API is a set of protocols and tools for building applications. After DNS resolution, the requests reach the app servers. Every developer needs to learn about APIs.

Cookie 173
article thumbnail

Facebook’s historic outage, explained

Kentik

According to a statement published last night, Facebook Engineering wrote, “Configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication.” So what happened? billion users attempting in vain to reconnect to their services.

TCP 145
article thumbnail

Securing Your Network Against Attacks: Prevent, Detect, and Mitigate Cyberthreats

Kentik

Protocol-based. These attacks overwhelm network infrastructure resources, targeting layer 3 and layer 4 communication protocols. Common protocol-based attacks are Ping of Death, Smurf DDoS, and SYN floods. From a networking perspective, a lot of valuable prevention data is available to engineers who know how to use it.

Network 94
article thumbnail

Practical Steps for Enhancing Reliability in Cloud Networks - Part I

Kentik

More than anything, reliability becomes the principal challenge for network engineers working in and with the cloud. Even the most detailed reliability engineering can be easily undermined in an insecure network. While there is much to be said about cloud costs and performance , I want to focus this article primarily on reliability.

Cloud 104