We believe in data-driven protocol design and optimization.
We are committed to top-quality research that will unblock your next performance target.
We exist in order to make your network better, faster and safer, so that you don't have to. And while doing that save you money too!
Our commitment to rigorous analysis and data-driven studies is bound to optimize your networking stack for good.
Our crawler runs 24/7 and gathers data that among others reveal: network size, node uptime, agent version distribution and uptake, geolocation of nodes, cloud infra providers.
These are essential data-points that every network operator needs to be aware of to make the right deployment, release and maintenance decisions.
One month-long deep dive into your networking stack by our team of experts. At the end of the diagnostics study you will know: the strong and weak points of your networking stack, how you can improve performance, where to start if you want to save money for node operators, or infrastructure providers, which is the most vulnerable part of your stack.
Depending on the specifics of the network stack, basic measurement tooling can also be provided.
Every network comes with its own needs and specificities. We develop measurement and monitoring tooling to help you get insights into the metrics that matter to you the most.
Alongside tooling comes: i) specialized infrastructure setup, ii) data analysis to turn data into actionable optimization tasks.
Monitoring tools can vary from high-level network characteristics, e.g., node centrality distribution, to low-level protocol parameters, e.g., pubsub protocol parameter setting for fast message propagation.
Correct operation of systems and networks is very often defined by boundaries and thresholds. Exceeding thresholds raises alarms and triggers either manual or automated corrective actions. Two examples of tools we have built alerting for recently are:
Bootstrapper Uptime Monitoring: the tool is monitoring bootstrappers and is sending alerts when one or several of them are down simultaneously and for longer than a pre-defined period.
DHT Keyspace Density Monitoring: increased density of peers at some part of the keyspace could be a signal of an ongoing Eclipse attack attempt. Our specialised monitoring can trigger alerts when this happens to investigate in more detail the phenomenon.
Regulations such as MiCA and other similar ones are getting a lot of traction lately and are scheduled to come into effect within 2024. Our specialised and battle-tested tooling can provide detailed numbers for regulatory purposes and cover metrics such as: network size, node types and client implementations, geolocation and geographic distribution of nodes, cloud deployment are some of the central items that will be required.
Your users and node operators do not need to take your word for the correct functioning of your networked system. We act as an independent third-party verifiability service to build dashboards, visualize metrics and report the most important data to your users, investors and ecosystem partners.
Together, we'll navigate challenges, and explore opportunities.