Sponsored Post: Datadog, InMemory.Net, Triplebyte, Etleap, Scalyr, MemSQL

Who's Hiring? 

  • Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.

  • Need excellent people? Advertise your job here! 

Fun and Informative Events

  • Advertise your event here!

Cool Products and Services

  • Datadog is a cloud-scale monitoring platform that combines infrastructure metrics, distributed traces, and logs all in one place. With out-of-the-box dashboards and seamless integrations with over 200 technologies, Datadog provides end-to-end visibility into the health and performance of modern applications at scale. Build your own rich dashboards, set alerts to identify anomalies, and collaborate with your team to troubleshoot and fix issues fast. Start a free trial and try it yourself.

  • InMemory.Net provides a Dot Net native in memory database for analysing large amounts of data. It runs natively on .Net, and provides a native .Net, COM & ODBC apis for integration. It also has an easy to use language for importing data, and supports standard SQL for querying data. http://InMemory.Net

Digital businesses need a smarter network edge

As the world has become more cloud- and IoT-centric, the network has increased in value. That is why there has been so much focus on network evolution, particularly in the data center and the wide area network.One part of the network that has lagged in innovation, however, is the network edge. Over the years, the edge of the network has been considered by many to be a commodity. And for many businesses, it is in dire need of a refresh. I’ve talked to some organizations that are running network edge infrastructure that’s approaching 10 years old and haven’t even had a software upgrade in years.[ Related: Getting grounded in intent-based networking ] The network edge needs to evolve However, in the words of the esteemed song writer Bob Dylan, “The times, they are a changing” — and so is the role of the network edge.To read this article in full, please click here

Digital businesses need a smarter network edge

As the world has become more cloud- and IoT-centric, the network has increased in value. That is why there has been so much focus on network evolution, particularly in the data center and the wide area network.One part of the network that has lagged in innovation, however, is the network edge. Over the years, the edge of the network has been considered by many to be a commodity. And for many businesses, it is in dire need of a refresh. I’ve talked to some organizations that are running network edge infrastructure that’s approaching 10 years old and haven’t even had a software upgrade in years.[ Related: Getting grounded in intent-based networking ] The network edge needs to evolve However, in the words of the esteemed song writer Bob Dylan, “The times, they are a changing” — and so is the role of the network edge.To read this article in full, please click here

TunapandaNET Paves the Way for Kenya to Connect the Underserved

Currently, 53% of the world’s population is offline due to factors such as high cost of Internet infrastructure and lack of relevant local content. Internet access remains unaffordable in many economies in transition where people have to choose between the Internet and other vital necessities such as food and health. Maybe one day we will look back at this historic moment in which Community Networks were paving the way for equitable and meaningful access to technology.

Community Networks are an emerging complementary and sustainable solution to address the connectivity gap existing in underserved urban and rural areas around the world. Such networks rely on the active participation of local communities in the development and management of shared Internet infrastructure as a common resource.  Existing examples provide concrete evidence that community network development can prompt positive effects to help communities leverage on technology for socioeconomic empowerment. We have gained experience from Guifi.Net, Zenzeleni Network, Rhizomatica and Wireless For Communities, all successful projects proving that the technical side of the community network model can be replicated.

I asked Josephine Miliza a few questions to get deeper insight into the project. Josephine is a network engineer with a Continue reading

IDG Contributor Network: The key to paying down technical debt

As business leaders, we make decisions every day that have the potential to create some level of technical debt. We choose to deploy a new business application that streamlines HR processes but may require frequent patching, or we expedite delivery of a new product feature knowing there will be increased management overhead. To some extent, technical debt is unavoidable, but when debt accumulates over time, it will limit business velocity and stifle an organization’s ability to innovate.For many enterprises, substantial technical debt is created by legacy applications, disparate platforms and processes, and outdated technology, and it is dragging down modernization initiatives. Organizations need to modernize their IT stack to compete in a digital economy, but – similar to the challenges of personal finance – you cannot begin to truly invest until you’ve paid off the debt you owe.To read this article in full, please click here

Prepare for the future without net neutrality

Net neutrality officially ended on June 11, 2018, and many people are concerned that this is the end of an open internet. Many supporters of it believe the internet should be regulated no different than the phone system or power utility and that this change will decrease the performance of it. Opponents of net neutrality, argue that the end of it will now increase competition among the various internet service providers (ISPs) and increase coverage, improve performance, and lower costs.What is net neutrality? Net neutrality became effective by the Federal Communication Commission (FCC) under President Barack Obama in 2015. It is a set of rules that ensured ISPs treated all data transmissions, irrespective to content, that flowed through their infrastructure equally. Net neutrality protections prevented ISPs from slowing web services, blocking access to sites, or charging content organizations for faster delivery of streaming movies or videos. It is believed that antitrust laws did not go far enough in ensuring that all content received equal treatment.To read this article in full, please click here

Prepare for the future without net neutrality

Net neutrality officially ended on June 11, 2018, and many people are concerned that this is the end of an open internet. Many supporters of it believe the internet should be regulated no different than the phone system or power utility and that this change will decrease the performance of it. Opponents of net neutrality, argue that the end of it will now increase competition among the various internet service providers (ISPs) and increase coverage, improve performance, and lower costs.What is net neutrality? Net neutrality became effective by the Federal Communication Commission (FCC) under President Barack Obama in 2015. It is a set of rules that ensured ISPs treated all data transmissions, irrespective to content, that flowed through their infrastructure equally. Net neutrality protections prevented ISPs from slowing web services, blocking access to sites, or charging content organizations for faster delivery of streaming movies or videos. It is believed that antitrust laws did not go far enough in ensuring that all content received equal treatment.To read this article in full, please click here

Debugging with intelligence via probabilistic inference

Debugging with intelligence via probabilistic inference Xu et al., ICSE’18

Xu et al. have built a automated debugger that can take a single failing test execution, and with minimal interaction from a human, pinpoint the root cause of the failure. What I find really exciting about it, is that instead of brute force there’s a certain encoded intelligence in the way the analysis is undertaken which feels very natural. The first IDE / editor to integrate a tool like this wins!

The authors don’t give a name to their tool in the paper, which is going to make it awkward to refer to during this write-up. So I shall henceforth refer to it as the PI Debugger. PI here stands for probabilistic inference.

We model debugging as a probabilistic inference problem, in which the likelihood of each executed statement instance and variable being correct/faulty is modeled by a random variable. Human knowledge, human-like reasoning rules and program semantics are modeled as conditional probability distributions, also called probabilistic constraints. Solving these constraints identifies the most likely faulty statements.

In the evaluation, when debugging problems in large projects, it took on average just 3 interactions with a developer to find the Continue reading

Cisco’s David Goeckeler talks security, networking, software and SD-WAN outlook

David Goeckeler doesn’t wear all of the hats at Cisco but he certainly wears one of the biggest.Responsible for 20,000 engineers and $32 billion worth of the networking giant’s business, Goeckeler, executive vice president and general manager, masterminds Cisco's network and security strategy which now features ever more emphasis on software. In fact, at the recent Cisco Live, Goeckeler emphasized that notion saying, “all the routers and switches and wireless access points (and in big networks there are going to be tens of thousands of those in a single enterprise network) we're thinking about that as one large software system.”To read this article in full, please click here

Cisco’s David Goeckeler talks security, networking, software and SD-WAN outlook

David Goeckeler doesn’t wear all of the hats at Cisco but he certainly wears one of the biggest.Responsible for 20,000 engineers and $32 billion worth of the networking giant’s business, Goeckeler, executive vice president and general manager, masterminds Cisco's network and security strategy which now features ever more emphasis on software. In fact, at the recent Cisco Live, Goeckeler emphasized that notion saying, “all the routers and switches and wireless access points (and in big networks there are going to be tens of thousands of those in a single enterprise network) we're thinking about that as one large software system.”To read this article in full, please click here

Cisco’s David Goeckeler talks security, networking, software and SD-WAN outlook

David Goeckeler doesn’t wear all of the hats at Cisco but he certainly wears one of the biggest.Responsible for 20,000 engineers and $32 billion worth of the networking giant’s business, Goeckeler, executive vice president and general manager, masterminds Cisco's network and security strategy which now features ever more emphasis on software. In fact, at the recent Cisco Live, Goeckeler emphasized that notion saying, “all the routers and switches and wireless access points (and in big networks there are going to be tens of thousands of those in a single enterprise network) we're thinking about that as one large software system.”To read this article in full, please click here