Tag Networking

Scalable Multiplayer Games with Yan Cui

http://traffic.libsyn.com/sedaily/ScalableMultiplayerGames.mp3Podcast: Play in new window | DownloadRemember when the best game you could play on your phone was Snake? In 1998, Snake was preloaded on Nokia phones, and it was massively popular. That same year Half-Life won game of the year on PC. Metal Gear Solid came out for Playstation. The first version of Starcraft also came out in 1998. In 1998, few people would have anticipated that games with

Continue reading…

Internet Monitoring with Matt Kraning

http://traffic.libsyn.com/sedaily/InternetMonitoring.mp3Podcast: Play in new window | Download How would you build a system for indexing and monitoring the entire Internet? Start by breaking the Internet up into IP address ranges. Give each of those address ranges to servers distributed around the world. On each of those servers, iterate through your list of IP addresses, sending packets to them. Depending on what sorts of packets those IP addresses respond to, and

Continue reading…

Video Infrastructure with Matt McClure and Jon Dahl

http://traffic.libsyn.com/sedaily/VideoInfrastructure.mp3Podcast: Play in new window | Download Playing a video on the Internet seems simple. You press play, the video gets delivered, and boom–you are watching Game of Thrones, right? It’s a bit more complicated. Unless you have built an application that involves video, you probably have not dealt with the world of codecs, bitrates, and streaming. Depending on the bandwidth between the user and the server, you might want

Continue reading…

Attack Attribution with John Davis

http://traffic.libsyn.com/sedaily/AttackAttribution.mp3Podcast: Play in new window | Download When a cyber attack occurs, how do we identify who committed it? There is no straightforward answer to that question. Even if we know Chinese hackers have infiltrated our power grid with logic bombs, we might not be able to say with certainty whether those hackers were state actors or rogue Chinese hackers looking for an offensive asset to sell to their government.

Continue reading…

Open Compute Project with Steve Helvie

http://traffic.libsyn.com/sedaily/OpenComputeProject.mp3Podcast: Play in new window | Download Facebook was rapidly outgrowing its infrastructure in 2009. Classic data center design was not up to the task of the rapid influx of new users and data, photos and streaming video hitting Facebook’s servers. A small team of engineers spent the next two years designing a data center from the ground up to be cheaper, more energy efficient, and more ergonomic for the

Continue reading…

Container Networking with Dan Williams

http://traffic.libsyn.com/sedaily/CNI.mp3Podcast: Play in new window | Download Containers are widely used in projects that have adopted Docker, Kubernetes, or Mesos. Containers allow for better resource isolation and scalability. With all of the adoption of containers, companies like Red Hat, Google, and CoreOS are working on improved standards within the community. Standards are important to this community because of its pace of growth and the number of concurrent projects. If you

Continue reading…

Backups with Kenny To

http://traffic.libsyn.com/sedaily/Rubrik.mp3Podcast: Play in new window | Download Every software company backs up critical data sources. Backing up databases is a common procedure, whether a company is in the cloud or on-prem. Backing up virtual machine instances is less common. Rubrik is a company that is known for building backup infrastructure for enterprises. Their main product is an appliance that sits on prem at an enterprise and stores snapshots of virtual

Continue reading…

DNS with Phil Stanhope

http://traffic.libsyn.com/sedaily/dns_edited.mp3Podcast: Play in new window | Download DNS stands for domain name system. This is the naming system that maps the entire internet. It associates information with domain names. More specifically, DNS specifies mappings between numerical IP addresses and domain names. Most engineers know these basic facts about DNS, but they may not know how much engineering a complex company like Etsy or Zappos puts into their DNS configuration. Dynamic

Continue reading…

Failure Injection with Kolton Andrus

http://traffic.libsyn.com/sedaily/gremlin_edited.mp3Podcast: Play in new window | Download Servers in a data center fail. Sometimes entire data centers have a power outage. Bugs in an application make it into production. Human operators make mistakes and cause data to be deleted. Failure is unavoidable. We make backups and replicate our servers so that when a failure occurs, we can quickly respond to it without making the user feel much pain. But how

Continue reading…

Infrastructure with Datanauts’ Chris Wahl and Ethan Banks

http://traffic.libsyn.com/sedaily/DataNauts.mp3Podcast: Play in new window | Download Infrastructure is a term that can mean many different things: your physical computer, the data center of your Amazon EC2 cluster, the virtualization layer, the container layer–on and on. In today’s episode, podcasters Chris Wahl and Ethan Banks discuss the past, present, and future of infrastructure with me. Ethan and Chris host Datanauts, a podcast about infrastructure. In each episode, Datanauts goes deep

Continue reading…

Scaling Email with J.R. Jasperson

http://traffic.libsyn.com/sedaily/scaling_emails_Edited.mp3Podcast: Play in new window | Download “As the scale continues to increase, certain effects of architecture become less and less efficient.” When you spend money online, you expect a receipt to come in your email. When you register for a new web site, you need to verify your sign up in your email. These types of emails are called “transactional email” and sending these types of email at scale

Continue reading…

WebTorrent with Feross Aboukhadijeh

“The BitTorrent DHT is an amazing engineering feat and one of the coolest ideas in computer science, I think, because it works without any central coordination.”

Continue reading…

Let’s Encrypt with Josh Aas

“If everyone is going to use TLS, people need to trust their certificate authority, and the way to gain trust is through openness.”

Continue reading…