Operations | Monitoring | ITSM | DevOps | Cloud

True Visibility: How Liang Chen is Rethinking Network Monitoring

What happens when deep networking expertise meets low-level programming and a passion for invention? In this episode of Next-Gen Network Heroes, host Bob Slevin sits down with Liang Chen, Senior Network Architect at Texas Children's Hospital and a true innovator in network performance and visibility. With more than 25 years of experience in networking, plus advanced expertise in programming languages like C and Assembly, Liang has built his own next-generation traffic analysis platform from the ground up—designed to provide real-time, packet-level visibility at massive scale.

Enhancing Your Search Skills with Liang Chen

What does it take to reinvent network visibility from the ground up? In this episode of Next-Gen Network Heroes, Bob sits down with Liang Chen, Senior Network Architect at Texas Children’s Hospital and creator of a next-generation network traffic analyzer built for real-time, packet-level visibility. Liang shares how he built a platform capable of analyzing traffic at up to 200Gbps with zero packet loss—unlocking deeper network forensics and faster troubleshooting in mission-critical environments.

How HAProxy built its modern application delivery architecture

Let’s be real: building reliable tech products is hard. Modernizing that same tech without compromising the user experience is even harder. The "rip and replace" approach to modernization can severely disrupt your customers’ integration efforts and workflows. When it doesn’t work, reversing course might be the least-worst option. By contrast, the evolution of the HAProxy One application delivery platform architecture at HAProxy Technologies over 25 years has been gradual and consistent.

From Copy Fail to Dirty Frag: Why Speed-to-Exploit Is Forcing a New Approach to Linux Security

In early 2026, two back-to-back Linux kernel exploits, Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284 & CVE-2026-43500), shattered assumptions about how quickly attackers can weaponize disclosed CVEs. Dirty Frag, a zero-day Linux vulnerability that affected most major distributions, had PoC exploits published within hours of its disclosure. It’s a stark reminder: the timeline between vulnerability disclosure and active exploitation has shrunk from weeks to hours.

Builder in the loop: Henry Andrews on building AURA like production software

An interview series with the people building Mezmo’s open-source agentic harness for production operations. Builder in the loop is a Mezmo interview series focused on the engineers, product leaders, and operators shaping AURA, our open-source, MCP-native agentic harness for production operations. The goal is to get past the polished product layer and talk through the decisions that matter when AI starts interacting with real systems. What should agents be allowed to do?

ActiveMQ Message Persistence: KahaDB, Artemis Journal & JDBC

Every persistent message in ActiveMQ must survive a broker restart. That guarantee is the contract behind DeliveryMode.PERSISTENT is what separates a messaging system from a memory buffer. It is also what makes message persistence configuration the most consequential decision in ActiveMQ architecture.