• About
  • Disclaimer
  • Privacy Policy
  • Contact
Thursday, May 15, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Computer Networking

CLI Is an API « ipSpace.web weblog

Md Sazzad Hossain by Md Sazzad Hossain
0
Evaluating IGP and BGP Information Middle Convergence « ipSpace.internet weblog
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Andrew Yourtchenko and Dr. Tony Przygienda left great feedback to my Display screen Scraping in 2025 weblog submit, however sadly they like commenting on a closed platform with ephemeral content material; the one technique to make their ideas accessible to a wider viewers is by reposting them. Andrew first:


I hold saying CLI is an API. Nevertheless, it’s a lot easier and an simpler technique to adapt to the modifications, if these three situations are met:

  1. regexes are written in a defensive, but permissive trend (generously ignore the areas and features that don’t match, however be sure to ignore each areas and tabs)
  2. for the information that you simply do seize, be very conservative, such that your doubtless end result if one thing goes awry is not any information quite than rubbish information.
  3. deal with all of the parsed information as Possibility enum in a language which permits for that and at all times verify whether or not it’s Some(worth) or None earlier than utilizing it.

The (3) you’ll have to do anyway even with structured API, when dealing with the modifications. For the (1) and (2), if (in some legendary universe), distributors have been to publish the regexes, will probably be indistinguishable from the opposite transports. (I’m in fact leaving apart the query of information conversions, as a result of they’re equally an issue when utilizing the “structured” APIs as effectively, simply of a special form.


It seems like Cisco (having to cope with historic codebase with printf statements sprinkled throughout it) did one thing like what Andrew steered no less than as soon as (pyATS/Genie) if not twice (ConfD on Cisco IOS/XE).

Not surprisingly, Tony disagreed (most likely based mostly on his battle scars):

You might also like

The vCCAP Evo™ Answer Benefit, Half 2: Financial system & Effectivity

UK Altnets Present Strategic Naivete and Should Consolidate Quickly for Relevance – IT Connection

The very best CRM software program 2025: Streamline your buyer relationships


Sorry, it’s largely placing lipstick on you recognize what. It’s unimaginable to know as a vendor what sort of “sensible regexes” some buyer put in that may cope with “any change” till they’ll’t. As a result of regardless of the “sensible regex” is it’s nonetheless one thing that does essentially not perceive the semantic construction of the underlying output. And having handled a few of it it’s concerning the third circle of hell to keep up such “tremendous sensible regexes” with backtracking and no matter else not …


I’ve to agree with Tony: regexes suck, and I at all times want to work with structured information… if solely the distributors wouldn’t make it so cumbersome that it’s simpler to cope with the ache of screen-scraping.

Tags: APIBlogCLIipSpace.net
Previous Post

09309118341 – شماره تهران تبریزشماره مراغه، مرند و میانه شما

Next Post

Evolving from Bots to Brainpower: The Ascendancy of Agentic AI

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

The vCCAP Evo™ Answer Benefit, Half 2: Financial system & Effectivity
Computer Networking

The vCCAP Evo™ Answer Benefit, Half 2: Financial system & Effectivity

by Md Sazzad Hossain
May 15, 2025
Sale of BT’s Irish Enterprise Unit Underlines Finish of twentieth Century Telco International Domination Aspirations – IT Connection
Computer Networking

UK Altnets Present Strategic Naivete and Should Consolidate Quickly for Relevance – IT Connection

by Md Sazzad Hossain
May 15, 2025
The very best CRM software program 2025: Streamline your buyer relationships
Computer Networking

The very best CRM software program 2025: Streamline your buyer relationships

by Md Sazzad Hossain
May 14, 2025
MSTP Path Choice Concern in Ring Topology (Juniper EX2300-C & Cisco 3560-CX)
Computer Networking

MSTP Path Choice Concern in Ring Topology (Juniper EX2300-C & Cisco 3560-CX)

by Md Sazzad Hossain
May 14, 2025
Prime 10 Database Monitoring Instruments of 2025 » Community Interview
Computer Networking

Prime 10 Database Monitoring Instruments of 2025 » Community Interview

by Md Sazzad Hossain
May 13, 2025
Next Post
Evolving from Bots to Brainpower: The Ascendancy of Agentic AI

Evolving from Bots to Brainpower: The Ascendancy of Agentic AI

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Prime 10 Database Monitoring Instruments of 2025 » Community Interview

Prime 10 Database Monitoring Instruments of 2025 » Community Interview

May 13, 2025
How a Crypto Advertising and marketing Company Can Use AI to Create Highly effective Native Promoting Methods

How a Crypto Advertising and marketing Company Can Use AI to Create Highly effective Native Promoting Methods

May 11, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

The vCCAP Evo™ Answer Benefit, Half 2: Financial system & Effectivity

The vCCAP Evo™ Answer Benefit, Half 2: Financial system & Effectivity

May 15, 2025
Smashing Safety podcast #417: Good day, Pervert!

Smashing Safety podcast #417: Good day, Pervert!

May 15, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In