Referential Labs Blog
Learn from the best. Our blog is full of tips and tricks to help you deliver your software. When you need a little more help, we're here for you.
Lessons Learned Building RAG Systems for Many Clients
Struggling with RAG systems? Learn from a performance engineer's insights. Discover strategies for better recall, scalability, and customization. Contact Referential Labs for tailored solutions.
API-First
APIs enable software interoperability through abstraction. A sound API strategy focuses on security, reliability, documentation, and governance to efficiently share data and capabilities.
From VPNs to Zero Trust
Securing dynamic cloud networks with identity-centric, context-aware access controls instead of static VPN perimeters.
Test Driven Infrastructure with varnishtest
Learn how to implement test driven infrastructure configs with CI/CD pipelines for reliable and rapid delivery, varnishtest for automated testing of edge logic in Varnish
11 Varnish Web Acceleration Techniques Shield Your Slow Legacy Web Application
Struggling with a legacy web app that can't handle modern traffic? Before embarking on a risky rewrite, explore clever caching techniques to accelerate your aging application. This post reveals how to tune Varnish to achieve over 90% cache hit rates, reduce backend load, and optimize performance of your legacy code without engineering changes. Follow our battle-tested guide to caching strategies that buy time and deliver lasting relief for your vintage but valuable application.
Autothrottle: Manage Resources for SLO-Targeted Microservices
Efficiently managing resources for latency-sensitive microservices applications is challenging. Autothrottle is a new approach to resource management for microservices.
HTTP Load Balancing with NGINX
A comprehensive guide walking through HTTP load balancing with NGINX and explains how to distribute requests across multiple backend servers using different methods.
Open Source Software Supply Chain Attacks Review
This paper examines best practices for improving software supply chain security through a DevSecOps approach. As software supply chain attacks exploiting vulnerabilities in open source components increase, organizations need better methods to secure their code dependencies. The paper recommends techniques like maintaining a comprehensive inventory of open source libraries, prioritizing security updates, utilizing dependency analysis tools, establishing software integrity controls, and monitoring for emerging dependency threats.