A Primer on Provenance

Better understanding of data requires tracking its history and context.

LUCIAN CARATA, SHERIF AKOUSH, NIKILESH BALAKRISHNAN, THOMAS BYTHEWAY, RIPDUMAN SOHAN, MARGO SELTZER, ANDY HOPPER

Assessing the quality or validity of a piece of data is not usually done in isolation. You typically examine the context in which the data appears and try to determine its original sources or review the process through which it was created. This is not so straightforward when dealing with digital data, however: the result of a computation might have been derived from numerous sources and by applying complex successive transformations, possibly over long periods of time.

A Primer on Provenance

 

Related:
Provenance in Sensor Data Management
CTO Roundtable: Storage
Better Scripts, Better Games

 

Multipath TCP

Decoupled from IP, TCP is at last able to support multihomed hosts.

CHRISTOPH PAASCH AND OLIVIER BONAVENTURE, UCL

The Internet relies heavily on two protocols. In the network layer, IP (Internet Protocol) provides an unreliable datagram service and ensures that any host can exchange packets with any other host. Since its creation in the 1970s, IP has seen the addition of several features, including multicast, IPsec (IP security), and QoS (quality of service). The latest revision, IPv6 (IP version 6), supports 16-byte addresses.

Multipath TCP

 

Related:
Passively Measuring TCP Round-trip Times 
You Don’t Know Jack about Network Performance 
TCP Offload to the Rescue

Major-league SEMAT: Why Should an Executive Care?

Becoming better, faster, cheaper, and happier

IVAR JACOBSON, PAN-WEI NG, IAN SPENCE, AND PAUL E. MCMAHON

In today’s ever more competitive world, boards of directors and executives demand that CIOs and their teams deliver “more with less.” Studies show, without any real surprise, that there is no one-size-fits-all method to suit all software initiatives, and that a practice-based approach with some light but effective degree of order and governance is the goal of most software-development departments.

Major-league SEMAT—Why Should an Executive Care?

 

Related:
The Essence of Software Engineering: The SEMAT Kernel
A Conversation with Steve Bourne, Eric Allman, and Bryan Cantrill
Voyage in the Agile Memeplex

Eventually Consistent: Not What You Were Expecting?

Eventually Consistent: Not What You Were Expecting?

Wojciech Golab, Muntasir R. Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li

Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems
Related:
Eventually Consistent
Eventual Consistency Today: Limitations, Extensions, and Beyond
BASE: An Acid Alternative

Scaling Existing Lock-based Applications with Lock Elision

Scaling Existing Lock-based Applications with Lock Elision

Andi Kleen

Lock elision enables existing lock-based programs to achieve the performance benefits of nonblocking synchronization and fine-grain locking with minor software engineering effort.
Related:
Proving the Correctness of Nonblocking Data Structures
Erlang for Concurrent Programming
Trials and Tribulations of Debugging Concurrency

Node at LinkedIn: The Pursuit of Thinner, Lighter, Faster

A discussion with Kiran Prasad, Kelly Norton, and Terry Coatta

Node.js, the server-side JavaScript-based software platform used to build scalable network applications, has been all the rage among many developers for the past couple of years, although its popularity has also managed to enrage some others, who have unleashed a barrage of negative blog posts to point out its perceived shortcomings. Still, while new and untested, Node continues to win more converts.

Case StudyNode at LinkedIn: The Pursuit of Thinner, Lighter, Faster

 

Related:
Reveling in Constraints
Multitier Programming in Hop
High Performance Web Sites

Unikernels: Rise of the Virtual Library Operating System

What if all the software layers in a virtual appliance were compiled within the same safe, high-level language framework?

ANIL MADHAVAPEDDY AND DAVID J. SCOTT

Cloud computing has been pioneering the business of renting computing resources in large data centers to multiple (and possibly competing) tenants. The basic enabling technology for the cloud isoperating-system virtualization such as Xen1 or VMWare, which allows customers to multiplex VMs (virtual machines) on a shared cluster of physical machines. Each VM presents as a self-containedcomputer, booting a standard operating-system kernel and running unmodified applications just as if it were executing on a physical machine.

Unikernels: Rise of the Virtual Library Operating System

 

Related:
Self-Healing in Modern Operating Systems
Erlang for Concurrent Programming
Passing a Language through the Eye of a Needle