Planet Jabber

March 20, 2025

Erlang Solutions

Meet the team: Lorena Mireles

Lorena Mireles is an influential force in the BEAM community, known for her work as an Elixir developer and as a dedicated member of the Code BEAM America programme committee. She’s been instrumental in fostering connections and shaping discussions that help drive the future of Elixir.

In this interview, Lorena opens up about her journey with Elixir, her role on the committee, and what makes the BEAM community so unique.

Meet the team: Lorena Mireles

What first drew you to Elixir, and what keeps you hooked?

The community was, without a doubt, the first reason I became interested in Elixir. I had no prior knowledge of Elixir the first time I attended a conference, but I felt very comfortable at the talks. The explanations were clear and interesting, which motivated me to investigate the programming language further.

Also, everyone was very kind and willing to share their knowledge. Over time, I discovered the advantages of this programming language for designing powerful systems. I’m still amazed at how easy it is to create projects with complex technical requirements, all thanks to the way Elixir and BEAM were created, and all the material available to learn about them.

How did you get involved with the Code BEAM America committee, and what’s that experience been like?

I joined the committee at the invitation of the organisers, and I’m very grateful, as I’ve been a part of it for three consecutive editions, and I continue to learn and be surprised each time.

My work focuses primarily on promoting women’s participation at the conference and supporting the diversity program, which has allowed me to meet great women and learn about their projects and experiences. Overall, it’s a great opportunity to get to know the speakers a little better and get involved in the BEAM community.

I also learn about new topics, as seeing the talks they submit also motivates me to explore them.

What were your standout moments from this year’s Code BEAM America? 

 I’ll start with my favourite- reconnecting with the BEAM community. I admire so many people and their work, so Code BEAM America was a great experience to learn more about it. I also loved seeing the new speakers and first-time attendees. I chatted with some of them, and they loved the experience. It was great to get their feedback.

The keynotes were also some of my favourites. Machine Learning and AI were discussed, which seemed very appropriate given the current relevance of these topics. There were also a couple of talks focused on social aspects, which are always necessary to foster continuous improvement in teams.

What excites you most about the future of the BEAM community?

All the projects that will likely be happening this year. At this year’s Code BEAM, I met new speakers and saw new attendees, which means the knowledge continues to expand and the community grows, and that also means new projects and more material about Elixir and BEAM in general.

I’m excited to think about all the new things we’ll see and how we continue to encourage new people to participate because, without a doubt, Elixir is a programming language worth learning.

Final thoughts

Lorena’s experience with Elixir and her role in the BEAM community shows just how powerful collaboration and innovation can be in shaping the ecosystem. Beyond that, her Women in BEAM survey and Women in Elixir webinar are amazing resources she’s put together to foster more inclusivity in the community.

The post Meet the team: Lorena Mireles appeared first on Erlang Solutions.

by Erlang Solutions Team at March 20, 2025 10:32

Gajim

Gajim 2.0.4

This release brings improvements to Gajim’s Start Chat window and fixes some issues in group chats. Thank you for all your contributions!

What’s New

With Gajim 2.0, we migrated Gajim’s user interface toolkit to GTK 4, which brings performance improvements and sets the ground for great features to follow.

With Gajim 2.0.4 you can sort contacts by their status when browsing the Start Chat window. This release also fixes some problems with contact sorting in general. Furthermore, this new version fixes some issues which may occur while trying to export messages.

Gajim 2.0

Gajim 2.0

A note for Windows users: At the time of writing, there are some issues with emoji rendering on Windows. That’s why there is no release of Gajim 2.0 for Windows yet. This issue should soon be resolved and we will post an update once Gajim 2.0 is released on Windows.

More Changes

Fixes

  • Code preview handling has been improved for one line messages
  • Group chats: Ignore invites sent by other devices of ours

And much more! Have a look at the changelog for a complete list.

Gajim

As always, don’t hesitate to contact us at gajim@conference.gajim.org or open an issue on our Gitlab.

Gajim is free software developed by volunteers.
If you like to support Gajim, please consider making a donation.

Donate via Liberapay:

March 20, 2025 00:00

March 17, 2025

Prosodical Thoughts

Prosody 13.0.0 released!

Welcome to a new major release of the Prosody XMPP server! While the 0.12 branch has served us well for a while now, this release brings a bunch of new features we’ve been busy polishing.

If you’re unfamiliar with Prosody, it’s an open-source project that implements XMPP, an open standard protocol for online communication. Prosody is widely used to power everything from small self-hosted messaging servers to worldwide real-time applications such as Jitsi Meet. It’s part of a large ecosystem of compatible software that you can use for realtime online communication.

Before we begin…

The first thing anyone who has been following the project for a while will notice about this release is the version number.

Long adherents of the cult of 0ver, we finally decided it was time to break away. While, as Shakespeare wrote, “That which we call a rose, by any other name would smell as sweet”, such is true of version numbers. Prosody has been stable and used in production deployments for many years, however the ‘0.x’ version number occasionally misled people to believe otherwise. Apart from shifting the middle component leftwards, nothing has changed.

If you’re really curious, you can read full details in our versioning and support policy.

Our version numbers have also been in step with Debian’s for several versions now. Could this become a thing? Maybe!

Overview of changes

This release brings a wide range of improvements that make Prosody more secure, performant, and easier to manage than ever before. Let’s review the most significant changes that administrators and users can look forward to across a range of different topics.

Security and authentication

Security takes centre stage in this release with several notable improvements. Building on DNSSEC, the addition of full DANE support for server-to-server connections strengthens the trust between federating XMPP servers.

We’ve enhanced our support for channel binding, which is now compatible with TLS 1.3, and we’ve added support for XEP-0440 which helps clients know which channel binding methods the server supports. Channel binding protects your connection from certain machine-in-the-middle attacks, even if the server’s TLS certificate is compromised.

Account management

Administrators now have more granular control over user accounts with the ability to disable and enable them as needed. This can be particularly useful for public servers, where disabling an account can act as a reversible alternative to deletion.

In fact, we now have the ability to set a grace period for deleted accounts to allow restoring an account (within the grace period) in case of accidental deletion.

Roles and permissions

A new role and permissions framework provides more flexible access control. Prosody supplies several built-in roles:

  • prosody:operator - for operators of the whole Prosody instance. By default, accounts with this role have full access, including to operations that affect the whole server.
  • prosody:admin - the usual role for admins of a specific virtual host (or component). Accounts with this role have permission to manage user accounts and various other aspects of the domain.
  • prosody:member - this role is for “normal” user accounts, but specifically those ones which are trusted to some extent by the administrators. Typically accounts that are created through an invitation or through manual provisioning by the admin have this role.
  • prosody:registered - this role is also for general user accounts, but is used by default for accounts which registered themselves, e.g. if the server has in-band registration enabled.
  • prosody:guest - finally, the “guest” role is used for temporary/anonymous accounts and is also the default for remote JIDs interacting with the server.

For more details about how to use these roles, customize permissions, and more, read our new roles and permissions documentation. You will also find the link there for the development documentation, so module developers can make use of the new system.

Shell commands

Since the earliest releases, the prosodyctl command has been the admin’s primary way of managing and interacting with Prosody. In 0.12 we introduced the prosodyctl shell interface to send administrative commands to Prosody at runtime via a local connection. It has been a big success, and this release significantly extends its capabilities.

  • prosodyctl adduser/passwd/deluser commands now use the admin connection to create users, which improves compatibility with various storage and authentication plugins. It also ensures Prosody can instantly respond to changes, such as immediately disconnecting users when their account is deleted.
  • Pubsub management commands have been added, to create/configure/delete nodes and items on pubsub and PEP services without needing an XMPP client.
  • One of our own favourites as Prosody developers is the new prosodyctl shell watch log command, which lets you stream debug logs in real-time without needing to store them on the filesystem.
  • Similarly, there is now prosodyctl shell watch stanzas which lets you monitor stanzas to/from arbitrary JIDs, which is incredibly helpful for developers trying to diagnose various client issues.
  • Server-wide announcements can now be sent via the shell, optionally limiting the recipients by online status or role.
  • MUC has gained a few new commands for interacting with MUC rooms.

Improved Multi-User Chat (MUC) Management

The MUC system has received a significant overhaul focusing on security and administrative control. By default, room creation is now restricted to local users, providing better control over who can create persistent and public rooms.

Server administrators get new shell commands to inspect room occupants and affiliations, making day-to-day operations more straightforward.

One notable change is that component admins are no longer automatically owners. This can be reverted to the old behaviour with component_admins_as_room_owners = true in the config, but this has known incompatibilities with some clients. Instead, admins can use the shell or ad-hoc commands to gain ownership of rooms when it’s necessary.

Better Network Performance

Network connectivity sees substantial improvements with the implementation of RFC 8305’s “Happy Eyeballs” algorithm, which enhances IPv4/IPv6 dual-stack performance and increases the chance of a successful connection.

Support for TCP Fast Open and deferred accept capabilities (in the server_epoll backend) can potentially reduce connection latency.

The server now also better handles SRV record selection by respecting the ‘weight’ parameter, leading to more efficient connection distribution.

Storage and Performance Improvements

Under the hood, Prosody now offers better query performance with its internal archive stores by generating indexes.

SQLite users now have the option to use LuaSQLite3 instead of LuaDBI, potentially offering better performance and easier deployment.

We’ve also added compatibility with SQLCipher, a fork of SQLite that adds support for encrypted databases.

Configuration Improvements

The configuration system has been modernized to support referencing and appending to previously set options, making complex configurations more manageable.

While direct Lua API usage in the config file is now deprecated, it remains accessible through the new Lua.* namespace for those who need it.

Also new in this release is the ability to reference credentials or other secrets in the configuration file, without storing them in the file itself. It is compatible with the credentials mechanisms supported by systemd, podman and more.

Developer/API changes

The development experience has always been an important part of our project - we set out to make an XMPP server that was very easy to extend and customize. Our developer API has improved with every release. We’ve even had first-time coders write Prosody plugins!

There are too many improvements to list here, but some notable ones:

  • Storage access from modules has been simplified with a new ‘keyval+’ store type, which combines the old ‘keyval’ (default) and ‘map’ stores into a single interface. Before this change, many modules had to open the store twice to utilize the two APIs.
  • Any module can now replace custom permission handling with Prosody’s own permission framework via the simple module:may() API call.
  • Providing new commands for prosodyctl shell is now much easier for module developers.

Backwards compatibility is of course generally preserved, although is_admin() has been deprecated in favour of module:may(). Modules that want to remain compatible with older versions can use mod_compat_roles to enable (limited) permission functionality.

Important Notes for Upgrading

A few breaking changes are worth noting:

  • Lua 5.1 support has been removed (this also breaks compatibility with LuaJIT, which is based primarily on Lua 5.1).
  • Some MUC default behaviors have changed regarding room creation and admin permissions (see above).

Conclusion

We’re very excited about this release, which represents a significant step forward for Prosody, and contains improvements for virtually every aspect of the server. From enhanced security to better performance and more flexible administration tools, there has never been a better time to deploy Prosody and take control of your realtime communications.

For full detailed information about the changes in this release, and advice for upgrading, view the Prosody 13.0.0 release notes.

As always, if you have any problems or questions with Prosody or the new release, drop by our community chat!

by The Prosody Team at March 17, 2025 11:30

March 15, 2025

Gajim

Gajim 2.0.3

This release fixes some group chat issues and allows to store individual window sizes. Thank you for all your contributions!

What’s New

With Gajim 2.0, we migrated Gajim’s user interface toolkit to GTK 4, which brings performance improvements and sets the ground for great features to follow.

Gajim 2.0.3 will store dimensions for each window, so it always remembers your preferred window size. Furthermore, this release fixes issues with changing roles and affiliations in group chats.

Gajim 2.0

Gajim 2.0

A note for Windows users: At the time of writing, there are some issues with emoji rendering on Windows. That’s why there is no release of Gajim 2.0 for Windows yet. This issue should soon be resolved and we will post an update once Gajim 2.0 is released on Windows.

More Changes

Fixes

  • Chat: Bugfix for read markers being sent when chat was not at the bottom
  • Status Icon: State for mute sounds option is now shown correctly

And much more! Have a look at the changelog for a complete list.

Gajim

As always, don’t hesitate to contact us at gajim@conference.gajim.org or open an issue on our Gitlab.

Gajim is free software developed by volunteers.
If you like to support Gajim, please consider making a donation.

Donate via Liberapay:

March 15, 2025 00:00

March 14, 2025

The XMPP Standards Foundation

The XMPP Newsletter February 2025

XMPP Newsletter Banner

XMPP Newsletter Banner

Welcome to the XMPP Newsletter, great to have you here again! This issue covers the month of February 2025.

Like this newsletter, many projects and their efforts in the XMPP community are a result of people’s voluntary work. If you are happy with the services and software you may be using, please consider saying thanks or help these projects! Interested in supporting the Newsletter team? Read more at the bottom.

XSF Announcements

XMPP at FOSDEM 2025

During February 1st and 2nd, the XSF was present at FOSDEM 25 in Brussels, Belgium. The XMPP community took part of the Realtime Lounge, a corner located on the 2nd floor of the K building, where several open source projects around Real Time Communication (RTC) can present themselves.

We are pleased to say that there was a lot of interaction at the XMPP booth! A rather large number of FOSDEM visitors had the opportunity to come say “Hi!”, meet, interact, talk and have interesting conversations with many of the developers of the most popular clients, servers, tools and libraries that power the whole XMPP ecosystem and bring it to life.

In addition to the activities that took place on the XMPP booth, Jérôme Poisson (Goffi) hosted a most interesting presentation in the Real Time Communication (RTC) room, titled: A Universal and Stable API to Everything: XMPP.

And, of course .. we had the coolest swag, and plenty of stickers! ;)

XMPP stand at FOSDEM 2025!

XMPP stand at FOSDEM 2025!

Be Real!

Be Real!

High quality XMPP hoodies and zipped cardigans!

High quality XMPP hoodies and zipped cardigans!

XSF Fiscal Hosting Projects

The XSF offers fiscal hosting for XMPP projects. Please apply via Open Collective. For more information, see the announcement blog post. Current projects you can support:

XMPP Events

  • Berlin XMPP Meetup [DE / EN]: monthly meeting of XMPP enthusiasts in Berlin, every 2nd Wednesday of the month at 6pm local time.
  • XMPP Italian happy hour [IT]: monthly Italian XMPP web meeting, every third Monday of the month at 7:00 PM local time (online event, with web meeting mode and live streaming).
  • XMPP Sprint in Berlin: On Friday, 23rd, Saturday, 24th, and Sunday, 25th of May 2025.

Videos

XMPP Articles

XMPP Software News

XMPP Clients and Applications

  • Conversations has released versions 2.17.10 and 2.17.12 for Android.
  • Dino has released version 0.4.5.
  • Gajim has released version 2.0.0 and it comes with a big upgrade. Gajim migrated its user interface toolkit to GTK 4, which brings performance improvements and sets the ground for great features to follow. Check out the official announcement for more information and have a look at the changelog for a complete list.
  • Kaidan has released version 0.11.0 integrating Qt 6 support. In addition, this release improves the user interface and fixes some bugs. Have a look at the changelog for more details.
  • Monocles Chat 2.0.5 has been released for Android. This version brings in several fixes.
  • Movim has released version 0.29.2 with some important fixes and improvements. Head over to the Movim Blog for all the details.
  • prose-web-app has released versions 0.6.0 and 0.6.1 of its Web implementation of the Prose app.
Gajim 2.0: Chat window

Gajim 2.0: Chat window

Gajim 2.0: Mention a participant by typing @nickname

Gajim 2.0: Mention a participant by typing @nickname

XMPP Servers

  • MongooseIM has released version 6.3.2 of its Enterprise Instant Messaging Solution.

XMPP Libraries & Tools

Extensions and specifications

The XMPP Standards Foundation develops extensions to XMPP in its XEP series in addition to XMPP RFCs. Developers and other standards experts from around the world collaborate on these extensions, developing new specifications for emerging practices, and refining existing ways of doing things. Proposed by anybody, the particularly successful ones end up as Final or Active - depending on their type - while others are carefully archived as Deferred. This life cycle is described in XEP-0001, which contains the formal and canonical definitions for the types, states, and processes. Read more about the standards process. Communication around Standards and Extensions happens in the Standards Mailing List (online archive).

Proposed

The XEP development process starts by writing up an idea and submitting it to the XMPP Editor. Within two weeks, the Council decides whether to accept this proposal as an Experimental XEP.

  • Server-side spaces
    • This document defines an XMPP protocol to cluster several groupchat rooms together.

New

  • No new XEPs this month.

Deferred

If an experimental XEP is not updated for more than twelve months, it will be moved off Experimental to Deferred. If there is another update, it will put the XEP back onto Experimental.

  • No XEPs deferred this month.

Updated

  • No XEPs updated this month.

Last Call

Last calls are issued once everyone seems satisfied with the current XEP status. After the Council decides whether the XEP seems ready, the XMPP Editor issues a Last Call for comments. The feedback gathered during the Last Call can help improve the XEP before returning it to the Council for advancement to Stable.

  • No Last Call this month.

Stable

  • No XEPs moved to Stable this month.

Deprecated

  • No XEPs deprecated this month.

Rejected

  • No XEPs rejected this month.

Spread the news

Please share the news on other networks:

Subscribe to the monthly XMPP newsletter
Subscribe

Also check out our RSS Feed!

Looking for job offers or want to hire a professional consultant for your XMPP project? Visit our XMPP job board.

Newsletter Contributors & Translations

This is a community effort, and we would like to thank translators for their contributions. Volunteers and more languages are welcome! Translations of the XMPP Newsletter will be released here (with some delay):

  • English (original): xmpp.org
    • General contributors: Adrien Bourmault (neox), Alexander “PapaTutuWawa”, Arne, cal0pteryx, emus, Federico, Gonzalo Raúl Nemmi, Jonas Stein, Kris “poVoq”, Licaon_Kter, Ludovic Bocquet, Mario Sabatino, melvo, MSavoritias (fae,ve), nicola, Schimon Zachary, Simone Canaletti, singpolyma, XSF iTeam
  • French: jabberfr.org and linuxfr.org
    • Translators: Adrien Bourmault (neox), alkino, anubis, Arkem, Benoît Sibaud, mathieui, nyco, Pierre Jarillon, Ppjet6, Ysabeau
  • Italian: notes.nicfab.eu
    • Translators: nicola
  • Spanish: xmpp.org
    • Translators: Gonzalo Raúl Nemmi
  • German: xmpp.org
    • Translators: Millesimus

Help us to build the newsletter

This XMPP Newsletter is produced collaboratively by the XMPP community. Each month’s newsletter issue is drafted in this simple pad. At the end of each month, the pad’s content is merged into the XSF GitHub repository. We are always happy to welcome contributors. Do not hesitate to join the discussion in our Comm-Team group chat (MUC) and thereby help us sustain this as a community effort. You have a project and want to spread the news? Please consider sharing your news or events here, and promote it to a large audience.

Tasks we do on a regular basis:

  • gathering news in the XMPP universe
  • short summaries of news and events
  • summary of the monthly communication on extensions (XEPs)
  • review of the newsletter draft
  • preparation of media images
  • translations
  • communication via media accounts

Unsubscribe from the XMPP Newsletter

To unsubscribe from this list, please log in first. If you have not previously logged in, you may need to set up an account with the appropriate email address.

License

This newsletter is published under CC BY-SA license.

March 14, 2025 00:00

March 13, 2025

Erlang Solutions

Elixir vs Haskell: What’s the Difference?

Elixir and Haskell are two very powerful, very popular programming languages. However, each has its strengths and weaknesses. Whilst they are similar in a few ways, it’s their differences that make them more suitable for certain tasks.

Here’s an Elixir vs Haskell comparison.

Elixir vs Haskell: a comparison

Core philosophy and design goals

Starting at a top-level view of both languages, the first difference we see is in their fundamental philosophies. Both are functional languages. However, their design choices reflect very different priorities.

Elixir is designed for the real world. It runs on the Erlang VM (BEAM), which was built to handle massive concurrency, distributed systems, and applications that can’t afford downtime, like telecoms, messaging platforms, and web apps.

Elixir prioritises:

  • Concurrency-first – It uses lightweight processes and message passing to make scalability easier.
  • Fault tolerance – It follows a “Let it crash” philosophy to ensure failures don’t take down the whole system.
  • Developer-friendly – Its Ruby-like syntax makes functional programming approachable and readable.

Elixir is not designed for theoretic rigidness—it’s practical. It gives you the tools you need to build robust, scalable systems quickly, even if that means allowing some flexibility in functional integrity.

Haskell, on the other hand, is all about mathematical precision. It enforces a pure programming model. As a result, functions don’t have side effects, and data is immutable by default. This makes it incredibly powerful for provably correct, type-safe programs, but it also comes with a steeper learning curve.

We would like to clarify that Elixir’s data is also immutable, but it does a great job of hiding that fact. You can “reassign” variables and ostensibly change values, but the data underneath remains unchanged. It’s just that Haskell doesn’t allow that at all.

Haskell offers:

  • Pure functions – No surprises; given the same input, a function will always return the same output.
  • Static typing with strong guarantees – The type system (with Hindley-Milner inference, monads, and algebraic data types) helps catch errors at compile time instead of run time.
  • Lazy evaluation – Expressions aren’t evaluated until they’re needed, optimising performance but adding complexity.

Haskell is a language for those who prioritise correctness, mathematical rigour, and abstraction over quick iterations and real-world flexibility. That does not mean it’s slower and inflexible. In fact, experienced Haskellers will use its strong type guarantees to iterate faster, relying on its compiler to catch any mistakes. However, it does contrast with Elixir’s gradual tightening approach. Here, interaction between processes is prioritised, and initial development is quick and flexible, becoming more and more precise as the system evolves.

Typing: dynamic vs static

The next significant difference between Elixir and Haskell is how they handle types.

Elixir is dynamically typed. It doesn’t require explicitly declared variable types; it will infer them at run time. As a result, it’s fast to write and easy to prototype. It allows you to focus on functionality rather than defining types up front.

Of course, there’s a cost attached to this flexibility. If variables are computed at run time, any errors are also only detected then. Mistakes that could have been caught earlier come up when the code is executed. In a large project, this can make debugging a nightmare.

For example:

def add(a, b), do: a + b  

IO.puts add(2, 3)      # Works fine
IO.puts add(2, "three") # Causes a runtime error

In this example, “three” is a string but should’ve been a number and is going to return an error. Since it doesn’t type check at compile time, the error will only be caught when the function runs.

Meanwhile, Haskell uses static typing, which means all variable types are checked at compile time. If there’s a mismatch, the code won’t compile. This is very helpful in preventing many classes of bugs before the code execution.

For example:

add :: Int -> Int -> Int
add a b = a + b

main = print (add 2 3)    -- Works fine
main = print (add 2 "three")  -- Compile-time error

Here, the compiler will immediately catch the type mismatch and prevent runtime errors.

Elixir’s dynamic typing gives you faster iteration and more flexible development. However, it doesn’t rely only on dynamic typing for its robustness. Instead, it follows Erlang’s “Golden Trinity” philosophy, which is:

  • Fail fast instead of trying to prevent all possible errors.
  • Maintain system stability with supervision trees, which automatically restart failed processes.
  • Use the BEAM VM to isolate failures so they don’t crash the system.

Haskell’s static typing, on the other hand, gives you long-term maintainability and correctness up front. It’s particularly useful in high-assurance software projects, where errors must be kept to a minimum before execution.

In comparison, Elixir is a popular choice for high-availability systems. Both are highly reliable, but the former is okay with failure and relies on recovery at runtime, whilst the latter enforces correctness at compile-time.

Concurrency vs parallelism

When considering Haskell vs Elixir, concurrency is one of the biggest differentiators. Both Elixir and Haskell are highly concurrent but take different approaches to it. Elixir is built for carrying out a massive number of processes simultaneously. In contrast, Haskell gives you powerful—but more manual—tools for parallel execution.

Elixir manages effortless concurrency with BEAM. The Erlang VM is designed to handle millions of lightweight processes at the same time with high fault tolerance. These lightweight processes follow the actor model principles and are informally called “actors”, although Elixir doesn’t officially use this term.

Unlike traditional OS threads, these processes are isolated and communicate through message-passing. That means that if one process crashes, BEAM uses supervision trees to restart it automatically while making sure it doesn’t affect the others. This is typical of the ‘let it crash’ philosophy, where failures are expected and handled. There is no expectation to eliminate them entirely.

As a result, concurrency in Elixir is quite straightforward. You don’t need to manage locks, threads, or shared memory. Load balancing is managed efficiently by the BEAM scheduler across CPU cores, with no manual tuning required.

Haskell also supports parallelism and concurrency but it requires more explicit management. To achieve this, it uses several concurrency models, including software transactional memory (STM), lazy evaluations, and explicit parallelism to efficiently utilise multicore processors.

As a result, even though managing parallelism is more hands-on in Haskell, it also leads to some pretty significant performance advantages. For certain workloads, it can be several orders of magnitude faster than Elixir.

Additionally, Cloud Haskell extends Haskell’s concurrency model beyond a single machine. Inspired by Erlang’s message-passing approach, it allows distributed concurrency across multiple nodes, making Haskell viable for large-scale concurrent systems—not just parallel computations.

Scaling and parallelism continue to be one of the headaches of distributed programming. Find out what the others are.
[Read more]

Best-fit workloads

Both Haskell and Elixir are highly capable, but the kinds of workloads for which they’re suitable are different. We’ve seen how running on the Erlang VM allows Elixir to be more fault-tolerant and support massive concurrency. It can also run processes along multiple nodes for seamless communication. 

Since Elixir can scale horizontally very easily—across multiple machines—it works really well for real-time applications like chat applications, IoT platforms, and financial transaction processing.

Haskell optimises performance with parallel execution and smart use of system resources.  It doesn’t have BEAM’s actor-based concurrency model but its powerful programming features that allow you to make fine-grained use of multi-core processors more than make up for it.

It’s perfect for applications where you need heavy numerical computations, granular control over multi-core execution, and deterministic performance. 

So, where Elixir excels at processing high volumes of real-time transactions, Haskell works better for modelling, risk analysis, and regulatory compliance.

Ecosystem and tooling

Both Elixir and Haskell have strong ecosystems, but you must have noticed the theme running through our narrative. Yes, both are designed for different industries and development styles. 

Elixir’s ecosystem is practical and industry-focused, with a strong emphasis on web development and real-time applications. It has a growing community and a well-documented standard library, supplemented with production-ready libraries.

Meanwhile, Haskell has a highly dedicated community in academia, finance, human therapeutics, wireless communications and networking, and compiler development. It offers powerful libraries for mathematical modelling, type safety, and parallel computing. However, tooling can sometimes feel less user-friendly compared to mainstream languages.

For web development, Elixir offers the Phoenix framework: a high-performance web framework designed for real-time applications, which comes with built-in support for WebSockets and scalability. It follows Elixir’s functional programming principles but keeps development accessible with a syntax inspired by Ruby on Rails.

Haskell’s Servant framework is a type-safe web framework that leverages the language’s static typing to ensure API correctness. While powerful, it comes with a steeper learning curve due to Haskell’s strict functional nature.

Which one you should choose depends on your project’s requirements. If you’re looking for general web and backend development, Elixir’s Phoenix is the more practical choice. For research-heavy or high-assurance software, Haskell’s ecosystem provides formal guarantees.

Maintainability and refactoring

It’s important to manage technical debt while keeping software maintainable. Part of this is improving quality and future-proofing the code. Elixir’s syntax is clean and intuitive. It offers dynamic typing, meaning you can write code quickly without specifying types. This can make runtime errors harder to track sometimes, but debugging tools like IEx (Interactive Elixir) and Logger make troubleshooting straightforward.

It’s also easier to refactor because of its dynamic nature and process isolation. Since BEAM isolates processes, refactoring can often be done incrementally without disrupting the rest of the system. This is particularly handy in long-running, real-time applications where uptime is crucial.

Haskell, on the other hand, enforces strict type safety and a pure functional model, which makes debugging less frequent but more complex. As we mentioned earlier, the compiler catches most issues before runtime, reducing unexpected behaviour. 

However, this strictness means that refactoring in Haskell must be done carefully to maintain type compatibility, module integrity, and scope resolution. Unlike dynamically typed languages, where refactoring is often lightweight, Haskell’s strong type system and module dependencies can make certain refactorings more involved, especially when they affect function signatures or module structures. 

Research on Haskell refactoring highlights challenges like name capture, type signature compatibility, and module-level dependency management, which require careful handling to preserve correctness.

Then, there’s pattern matching, which both languages use, but do it differently.

Elixir’s pattern matching is flexible and widely used in function definitions and control flow, making code more readable and expressive.

Haskell’s pattern matching is type-driven and enforced by the compiler, ensuring exhaustiveness but requiring a more upfront design.

So, which of the two is easier to maintain?

Elixir is better suited for fast-moving projects where codebases evolve frequently, thanks to its fault-tolerant design and incremental refactoring capabilities.

Haskell provides stronger guarantees of correctness, making it a better choice for mission-critical applications where stability outweighs development speed.

Compilation speed

One often overlooked difference between Elixir and Haskell is how they handle compilation and code updates.

Elixir benefits from BEAM’s hot code swapping, where updates can be applied without stopping a running system. Additionally, Elixir compiles faster than Haskell because it doesn’t perform extensive type checking at compile time. 

This speeds up development cycles, which is what makes Elixir well-suited for projects requiring frequent updates and rapid iteration. However, since BEAM uses Just-In-Time (JIT) compilation, some optimisations happen at runtime rather than during compilation.

Haskell, on the other hand, has a much stricter compilation process. The compiler performs heavy type inference and optimisation, which increases compilation time but results in highly efficient, predictable code.

Learning curve

Elixir is often considered easier to learn than Haskell. Its syntax is clean and approachable, especially if you’re coming from Ruby, Python, or JavaScript. The dynamic typing and friendly error messages make it easy to experiment without getting caught up in strict type constraints.

Haskell, on the other hand, has a notoriously steep learning curve. It requires a shift in mindset, especially for those unfamiliar with pure functional programming, monads, lazy evaluation, and advanced type systems. While it rewards those who stick with it, the initial learning experience can be challenging, even if you’re an experienced developer.

Metaprogramming

Both Elixir and Haskell allow you to write highly flexible code, but they take different approaches.

Elixir provides macros, which you can modify and extend the language at compile time. This makes it easy to generate boilerplate code, create domain-specific languages (DSLs), and build reusable abstractions. However, improper use of macros can make code harder to debug and maintain.

Haskell doesn’t have macros but compensates with powerful type-level programming. Features like type families and higher-kinded types allow you to enforce complex rules at the type level. This enables incredible flexibility, but it also makes the language even harder to learn.

Choosing between the two

As you’ve seen, both Elixir and Haskell can be great, if used correctly in the right circumstances.

If you do choose Elixir, we’ve got a great resource that discusses how Elixir and Erlang—the language that forms its foundation—can help in future-proofing legacy systems. Find out how their reliability and scalability make them great for modernising infrastructures.

[Read more]

Want to learn more? Drop the Erlang Solutions team a message.

The post Elixir vs Haskell: What’s the Difference? appeared first on Erlang Solutions.

by Erlang Solutions Team at March 13, 2025 09:37

March 11, 2025

Mathieu Pasquet

slixmpp v1.9.1

This is mostly a bugfix release over version 1.9.0.

The main fix is the rust JID implementation that would behave incorrectly when hashed if the JID contained non-ascii characters. This is an important issue as using a non-ascii JID was mostly broken, and interacting with one failed in interesting ways.

Fixes

  • The previously mentioned JID hash issue
  • Various edge cases in the roster code
  • One edge case in the MUC (XEP-0045) plugin in join_muc_wait
  • Removed one broken entrypoint from the package
  • Fixed some issues in the MUC Self-Ping (XEP-0410) plugin

Enhancements

  • Stanza objects now have a __contains__ (used by x in y) method that allow checking if a plugin is present.
  • The You should catch Iq… exceptions message now includes the traceback
  • The MUC Self-Ping (XEP-0410) plugin allows custom intervals and timeouts for each MUC.
  • Added a STRICT_INTERFACE mode (currently a global var in the stanzabase module) that controls whether accessing a non-existing stanza attribute should raise or warn, it previously only warned.
  • The CI does more stuff
  • More type hints here and there

by mathieui at March 11, 2025 22:31

March 10, 2025

Gajim

Gajim 2.0.2

This release updates message moderation in group chats, improves handling of URIs, and fixes some bugs. Thank you for all your contributions!

What’s New

With Gajim 2.0, we migrated Gajim’s user interface toolkit to GTK 4, which brings performance improvements and sets the ground for great features to follow.

Gajim 2.0.2 updates Gajim’s support for XEP-0425: Moderated Message Retraction in group chats to its newest version and fixes several issues.

Gajim 2.0

Gajim 2.0

A note for Windows users: At the time of writing, there are some issues with emoji rendering on Windows. That’s why there is no release of Gajim 2.0 for Windows yet. This issue should soon be resolved and we will post an update once Gajim 2.0 is released on Windows.

More Changes

Fixes

  • Handling of URIs has been simplified, which resolves some issues
  • Message input: Some rare crashes when trying to send messages have been fixed
  • History export has been improved and some issues have been resolved

And much more! Have a look at the changelog for a complete list.

Gajim

As always, don’t hesitate to contact us at gajim@conference.gajim.org or open an issue on our Gitlab.

Gajim is free software developed by volunteers.
If you like to support Gajim, please consider making a donation.

Donate via Liberapay:

March 10, 2025 00:00

March 06, 2025

Erlang Solutions

Understanding Big Data in Healthcare

Healthcare generates large amounts of data every day. From patient records and medical scans to treatment plans and clinical trials. This information, known as big data, has the potential to improve patient care, improve efficiency, and drive innovation. But many organisations are still figuring out how to use it effectively.


With AI-driven analytics, wearable technology, and real-time monitoring, healthcare providers, insurers, and pharmaceutical companies are using data to make better decisions for patients, personalise treatments, and predict health trends. So how can you do the same?

Let’s explore the fundamentals of big data in healthcare, its real-world impact and what steps leaders can take to maximise its growing impact.

What is Big Data?

Big data refers to the vast amounts of structured and unstructured information from patient records, medical imaging, wearables, and clinical research. Proper analysis can improve patient care, support better decision-making, and reduce costs.

This data comes from a wide range of sources, including electronic health records (EHRs), test results, diagnoses, medical images, and real-time data from smart wearables. It also includes healthcare-related financial and demographic information. When properly analysed, it helps identify patterns, predict health trends, and support evidence-based decision-making.

The global healthcare market is expanding quickly and is expected to be worth USD 145.42 billion by 2033. As more organisations adopt AI-driven analytics and machine learning, data is becoming a key driver of innovation, helping healthcare professionals deliver more personalised and effective care.

The Three V’s of Big Data

To better understand big data, we can break it down into three key characteristics: volume, velocity, and variety.

Big Data in Healthcare 3 v's

1. Volume

The industry produces massive amounts of data, from electronic health records (EHRs) and medical imaging to clinical research and wearable devices. The total volume of healthcare data doubles every 73 days. Managing this requires advanced storage solutions, such as cloud computing and NoSQL databases, to handle both structured and unstructured data effectively.

2. Velocity

Healthcare data is constantly being created. Real-time data streams from patient monitoring systems, wearable technology, and AI-powered diagnostics provide continuous updates. To be useful, this data must be processed instantly, allowing professionals to make fast, informed decisions that support better patient care.

3. Variety

Healthcare data comes in many formats, from structured databases to unstructured text, images, videos, and biometric data. Around 80% of healthcare data is unstructured, meaning it doesn’t fit neatly into traditional databases. A patient’s medical history might include lab results, prescriptions, clinician notes, and radiology reports, all in different formats. Integrating and analysing this diverse information is essential for identifying trends and improving treatments.

Mastering these three V’s helps healthcare organisations make better use of data, leading to more accurate diagnoses, personalised treatments, and improved patient outcomes.

Key Sources of Healthcare Data

Now that we’ve discussed the Three V’s, it’s important to explore where this data originates. The primary sources of healthcare data contribute to the massive volumes of information, real-time updates, and diverse formats that we’ve just covered.

Here are some of the key sources:

  • Electronic Health Records (EHRs) & Medical Records (EMRs) – Digital records containing patient histories, test results, and prescriptions.
  • Wearable Devices & Health Apps – Smartwatches, fitness trackers, and remote monitoring tools that gather real-time health metrics.
  • Medical Imaging & Genomic Data – X-rays, MRIs, and DNA sequencing that assist in diagnostics, research, and precision medicine.
  • Clinical Trials & Research Databases – Data from large-scale studies that drive medical advancements and evidence-based medicine.
  • Public Health & Epidemiological Data – Population health data that track disease trends and guide public health strategies.
  • Hospital Information Systems (HIS) & Administrative Data – Operational data that help manage resources and patient flow within healthcare facilities.

These sources contribute to the expanding pool of healthcare data, helping organisations make smarter decisions and deliver better care for patients.

Benefits of Big Data in Healthcare

As healthcare organisations continue to collect more data, big data is proving to be a game-changer in improving patient care, driving clinical outcomes, and making healthcare more efficient. By analysing vast amounts of information, providers can identify trends and patterns that may have otherwise gone unnoticed. Below are some of the key benefits that big data brings to healthcare, from better patient care to more effective operations.

BenefitDescriptionImpact
Improved Patient CareIdentifies patterns to predict and prevent diseases, enabling personalised care.Could save the healthcare industry £230 billion to £350 billion annually through improved care and efficiency.
Cost ReductionOptimises resource allocation, reduces waste, and improves efficiency.Predictive analytics can cut hospital readmissions by up to 20%, leading to significant savings.
Enhanced Clinical OutcomesIntegrates data to identify the most effective treatments for patients.Improves clinical decision-making with real-time insights and evidence-based recommendations.
Accelerated Medical ResearchOffers large datasets for faster analysis, cutting clinical trial time and costs.Reduces clinical trial times by 30% and associated costs by 50%.
Predictive AnalyticsForecasts patient needs, improving outcomes and reducing readmissions.Helps optimise resources and reduce readmission rates, improving care and reducing costs.
Precision MedicineTailors treatments based on individual characteristics like genetics.Big Data enables more targeted and effective treatment plans.
Population Health ManagementIdentifies at-risk populations for targeted interventions.Reduces the prevalence of chronic diseases through early detection and personalised care.
Operational EfficiencyImproves processes like inventory management and reduces waste.Enhances resource management, reduces costs, and improves service delivery.

Data Privacy and Security in Healthcare

While big data enhances patient care and efficiency, it also brings critical data security challenges. IBM’s 2024 Cost of a Data Breach report highlights the average healthcare breach costs $9.77 million. Protecting patient data is crucial for maintaining trust and avoiding risks.

Understanding Big Data in Healthcare stats

Source: Cost of Data Breach Report, IBM

Key Challenges in Healthcare Data Security

Several issues make healthcare data security more difficult:

ChallengeDetails
Outdated SystemsOlder systems may have security gaps that hackers can exploit.
Weak PasswordsSimple or reused passwords make it easier for unauthorised people to access sensitive data.
Internal ThreatsEmployees or contractors could accidentally or intentionally compromise data security.
Mobile and Cloud SecurityAs healthcare uses more mobile devices and cloud storage, keeping data safe across different platforms becomes harder.

With so much data being collected and shared, these challenges are becoming more complex, making it crucial to stay on top of security measures.

Regulatory Framework: HIPAA and Beyond

In the U.S., the Health Insurance Portability and Accountability Act (HIPAA) sets the rules for protecting patient data. While HIPAA covers the basics, healthcare organisations need to stay on top of evolving security threats and regulations as technology changes.

Besides HIPAA, other important regulations include the HITECH Act, which supports the use of electronic health records (EHRs) and strengthens privacy protections, and the General Data Protection Regulation (GDPR) in the European Union, which controls how personal data is used and gives patients more control over their information.

In our previous blog, The Golden Age of Data in Healthcare, we touched on the challenges that come with using new technologies like blockchain. While blockchain offers secure data storage, it also raises concerns around data ownership and staying compliant with rules like HIPAA and GDPR.

Solutions to Enhance Healthcare Data Security

To better protect patient data, healthcare organisations should implement:

  • Data Encryption: Keeps data secure even if intercepted.
  • Multi-Factor Authentication (MFA): Adds an extra layer of security by requiring more than just a password.
  • System Monitoring and Threat Detection: Monitoring systems for unusual activity helps quickly spot potential breaches.
  • Employee Training: Teaching staff about security best practices and how to spot phishing attempts helps reduce risks.

By following clear security measures and meeting regulatory requirements, organisations can prevent breaches and keep patient trust intact.

Enhancing Healthcare Security with Erlang, Elixir, and SAFE

As we’ve seen, healthcare faces ongoing security challenges such as outdated systems, weak passwords, internal threats, and securing mobile and cloud data. Erlang and Elixir, by their very nature, offer solutions to these problems.

  • Outdated systems: Erlang and Elixir are built for high availability and fault tolerance, ensuring critical healthcare systems remain operational without the risk of system failures, even when legacy infrastructure is involved.
  • Weak passwords & internal threats: Both technologies provide process isolation and robust concurrency, limiting the impact of internal threats and reducing the risk of unauthorised access.
  • Mobile and cloud security: With Erlang and Elixir’s scalability and resilience, securing data across mobile platforms and cloud environments becomes easier, supporting secure, seamless data exchanges.

To further bolster security, SAFE (Security Audit for Erlang/Elixir) helps healthcare providers identify vulnerabilities in their systems. This service:

  • Identifies vulnerabilities in code that could expose systems to attacks.
  • Assesses risk levels to prioritise fixes.
  • Provides detailed reports that outline specific issues and solutions.

By combining the inherent security benefits of Erlang and Elixir with the proactive audit capabilities of SAFE, healthcare organisations can safeguard patient data, reduce risk, and stay compliant with regulations like HIPAA.

Conclusion

Big data is transforming healthcare by improving patient care and outcomes. However, with this growth comes the need to secure sensitive data and ensure compliance with regulations like HIPAA and GDPR.

Erlang and Elixir naturally address key security challenges, helping organisations protect patient information. Tools like SAFE identify vulnerabilities, reduce risks, and ensure compliance.

Ultimately, securing patient data is critical for maintaining trust and delivering quality care. If you would like to talk more about securing your systems or staying compliant, contact our team.

The post Understanding Big Data in Healthcare appeared first on Erlang Solutions.

by Erlang Solutions Team at March 06, 2025 13:23

March 03, 2025

Gajim

Gajim 2.0.1

This release resolves an issue with Gajim’s preferences window and fixes some bugs. Thank you for all your contributions!

What’s New

With Gajim 2.0, we migrated Gajim’s user interface toolkit to GTK 4, which brings performance improvements and sets the ground for great features to follow. Gajim 2.0.1 resolves an issue with Gajim’s preferences window and fixes some bugs.

Gajim 2.0

Gajim 2.0

A note for Windows users: At the time of writing, there are some issues with emoji rendering on Windows. That’s why there is no release of Gajim 2.0 for Windows yet. This issue should soon be resolved and we will post an update once Gajim 2.0 is released on Windows.

More Changes

Fixes

  • Start Chat: Ask for confirmation before forgetting group chat
  • Preferences: Fix showing configuration dialogs
  • Preferences: Show audio input selection again for configuring an input device for voice messages

And much more! Have a look at the changelog for a complete list.

Gajim

As always, don’t hesitate to contact us at gajim@conference.gajim.org or open an issue on our Gitlab.

Gajim is free software developed by volunteers.
If you like to support Gajim, please consider making a donation.

Donate via Liberapay:

March 03, 2025 00:00

February 28, 2025

Gajim

Gajim 2.0.0

Gajim 2.0 is here and it comes with a big upgrade 🎉 Gajim migrated its user interface toolkit to GTK 4, which brings performance improvements and sets the ground for great features to follow. Additionally, this release brings improved image previews, better tools for fighting spam, and much more. All of these changes were only possible by touching a lot of Gajim’s code base, and we appreciate all the feedback we got from you.

What’s New

Toolkit Upgrade

Switching Gajim’s major version from 1.x to 2.x is a step reserved for big changes. Upgrading from GTK 3 to GTK 4 is a great change, because it touches a big portion of Gajim’s code base. GTK is Gajim’s user interface toolkit. It provides building blocks, like windows, buttons and labels. Version 4 of this toolkit brings performance improvements to Gajim, e.g. faster rendering of user interface elements. Additionally, switching to GTK 4 allows Gajim to use newer widgets, like nice drop downs. Gajim 2.0 sets the ground for great features to follow.

Gajim 2.0

Gajim 2.0

A note for Windows users: At the time of writing, there are some issues with emoji rendering on Windows. That’s why there is no release of Gajim 2.0 for Windows yet. This issue should soon be resolved and we will post an update once Gajim 2.0 is released on Windows.

Contact List

Historically, Gajim used a “buddy list” (internally called “roster”) for displaying chat contacts. Group chats were displayed in that list as well, forming a large tree view. Gajim moved away from that concept with Gajim 1.4, because it did not offer what users expect from a modern chat app, and because its user experience wasn’t really great. However, a basic version of that “roster” view still remained on Gajim’s account page for contact management purposes. In Gajim 2.0, all contact management actions are bundled in a new “Manage Contact List” window. The old “Synchronize Accounts” window has been integrated there as well.

Spam Fighting Tools

With a growing community, the chance of witnessing spam increases. While the XMPP community develops measures to suppress spam effectively on the server level, clients can offer tools to assist moderators. Gajim now provides moderators with an improved voice request management and with an action to moderate all messages of a spammer at once.

Jingle File Transfer and Audio/Video Calls

Both Gajim’s Jingle File Transfer (direct peer-to-peer file transfers) and audio/video call implementations haven’t seen a maintainer for a long time. This lack of maintenance lead to what is called “bit-rot” in tech jargon, meaning these features stopped working properly over time. We decided to hide and disable both features until they have been reimplemented properly. File transfers via HTTP Upload (through your provider’s server) are of course still available.

More Changes

New

  • Message composing: You can now compose messages while being offline
  • Group chats: A ‘Direct Message’ menu item in the participants menu allows you to send messages directly
  • Chat filters: Filter chats of your chat list or in “Start Chat” by account, chat type, or group
  • Gajim features a new completion popover for inserting emojis (triggered by :emoji:) and mentioning group chat participants by their nickname (triggered by @nickname)
Mention a participant by typing @nickname

Mention a participant by typing @nickname

Changes

  • Windows: On Windows, images are stored in the user’s Downloads folder to avoid issues with the MS Store release
  • Chat history export: Gajim now allows exporting individual chat history directly via its chat menu
  • Performance and styling of Gajim’s file preview has been improved thanks to @mesonium

Fixes

  • Text wrapping issues in connection with some characters have been resolved
  • Message input: Issues with the message input scrolling out of view while adding newlines have been resolved
  • Passwords: Showing the password dialog for multiple accounts simultaneously has been fixed

And much more! Have a look at the changelog for a complete list.

Gajim

As always, don’t hesitate to contact us at gajim@conference.gajim.org or open an issue on our Gitlab.

Gajim is free software developed by volunteers.
If you like to support Gajim, please consider making a donation.

Donate via Liberapay:

February 28, 2025 00:00

February 27, 2025

Mathieu Pasquet

slixmpp v1.9.0

It has not been too long since 1.8.6 and here we are with 1.9.0, which is kind of a major release (following the well-known pridever numbering scheme).

Long story short, there are at least two major changes warranting the new number (and plenty of other things, read on!):

  • switching the cython jid implementation for a rust one, which will be faster and more correct
  • removing the xmpp.process() method (planned since the 1.8.0 release)

Special thanks to nicoco and Link Mauve, as well as to anyone who contributed (code, reviews, bug reports or otherwise).

New feature: rust jid implementation

Backed by the rust jid crate, this code that is in the critical path of slixmpp as it is being called a lot (the reason it was already in cython), and the pure python fallback is both less correct and many orders of magnitude slower. It has been kept for practical reasons, but users have to keep in mind that its use is not recommended if they can avoid it.

This does mean that packaging may get a little bit trickier since providing the full package means having access to a rust compiler that is up-to-date enough to build the jid crate.

The new implementation should work just as the old one, or better (even pickling/unpickling objects should just work), but if we unknowingly broke your use case, do not hesitate to open an issue.

Pyproject

Nicoco also took the occasion to move our very old setup.py to a pyproject.toml. The recommended tooling to interact with slixmpp is now uv, but pip or other tools should work just fine.

Breaking: Removal of xmpp.process()

This method has been a bit of a wart for a long time as it was directly inherited from sleekxmpp where the processing model is multi threaded. This hid away asyncio to our users, leading to much confusion in how they should interact with it.

Today all examples and documentation should have been updated accordingly. If anything is amiss, please reach out.

Fixes

  • fixed the oldest open issue, dating back from the very moment we forked sleekxmpp into slixmpp, which is the the Jabber-RPC plugin (XEP-0009), it finally works again.
  • fixed one long-standing issue regarding stream management (XEP-0198).
  • fixed the use of the python-emoji lib, in reactions (XEP-0444), which would previously only allow single character emojis, regardless of the final display size.
  • fixed event loop creation through get_event_loop, which has been deprecated for a while and will be broken in python 3.14.
  • fixed an issue in Persistent Storage of Private Data via Pubsub (XEP-0223) where doing a standalone configuration would not work.
  • fixed a worklow issue in Ad-hoc commands (XEP-0050) that prevented going back (prev) when there was no next action.
  • fixed a bug in PubSub (XEP-0060) where get_item_ids would not return any data.
  • fixed the lack of validation Data Forms (XEP-0004) where a text-single type could have multiple values (which is a MUST NOT).
  • fixed the use case (broken since 1.8.0) of using join_muc as a component in XEP-0045.
  • fixed the missing dependency link from groupchat (XEP-0045) to User nickname (XEP-0172).
  • fixed the stanza editing in the groupchat presence handler when trying to access the user nickname.
  • fixed a possible race condition in join_muc_wait.

Features & improvements

  • Rust JID implementation, see above.
  • MUC Ping (XEP-0410) has its own plugin, which provides a facility for checking if we are still inside a room.
  • Implementation of Chat Notification Settings (XEP-0492).
  • Implementation of Call Invites (XEP-0482) (This does not mean that calls work).
  • Completed support for File Metadata (XEP-0446).
  • Allowed custom SSLContext passing to XMLStream/ClientXMPP/ComponentXMPP.
  • The disco#info (XEP-0030) stanza plugin can now return a list of python dicts containing the identities contained in the stanza.
  • The doc is now more up-to-date on the plugins and contains more info on asyncio and other topics.
  • The Message Correction (XEP-0308) plugin now has build_correction and correct_message utilities.
  • The connect() method now returns a Future that can be awaited
  • Added make_join_stanza function in XEP-0045 for more flexibility.
  • Added a set_self_nick method to XEP-0045.
  • Added a multi_from option to the groupchat plugin to cater to the case of a component acting as multiple clients on a remote room.
  • Some mypy fixes.

Breaking changes

  • As mentioned before, removal of Client/ComponentXMPP.process()
  • BaseXMPP.make_iq no longer has a default id parameter of value 0
  • The xep_0045 plugin has had quite a bit of internal changes, so breakage could happen.

by mathieui at February 27, 2025 22:31

Erlang Solutions

Top 5 IoT Business Security Basics

IoT is now a fundamental part of modern business. With more than 17 billion connected devices worldwide, IoT business security is more important than ever. A single breach can expose sensitive data, disrupt operations, and damage a company’s reputation.

To help safeguard your business, we’ll cover five essential IoT security insights: data encryption, strong password policies, regular security audits, employee awareness training, and disabling unnecessary features.

1) Secure password practices

Weak passwords make IoT devices susceptible to unauthorised access, leading to data breaches, privacy violations and increased security risks. When companies install devices, without changing default passwords or by creating oversimplified ones, they create a gateway entry point for attackers. Implementing strong and unique passwords can ensure the protection of these potential threats.

Password managers

Each device in a business should have its own unique password that should change on a regular basis. According to the 2024 IT Trends Report by JumpCloud, 83% of organisations surveyed use password-based authentication for some IT resources.

Consider using a business-wide password manager to store your passwords securely, and use unique passwords across multiple accounts. 

Password managers are also incredibly important as they:

  • Help to spot fake websites, protecting you from phishing scams and attacks.
  • Allow you to synchronise passwords across multiple devices, making it easy and safe to log in wherever you are.
  • Track if you are re-using the same password across different accounts for additional security.
  • Spot any password changes that could appear to be a breach of security.

Multi-factor authentication (MFA)

Multi-factor authentication (MFA) adds an additional layer of security. It requires additional verification beyond just a password, such as SMS codes, biometric data or other forms of app-based authentication. You’ll find that many password managers offer built-in MFA features for enhanced security.

Some additional security benefits include:

  • Regulatory compliance
  • Safeguarding without password fatigue
  • Easily adaptable to a changing work environment
  • An extra layer of security compared to two-factor authentication (2FA)

As soon as an IoT device becomes connected to a new network, it is strongly recommended that you reset any settings with a secure, complex password. Using password managers allows you to generate unique passwords for each device to secure your IoT endpoints optimally.

2) Data encryption at every stage

Why is data encryption so necessary? With the increased growth of connected devices, data protection is a growing concern. In IoT, sensitive information (personal data, financial, location etc) is vulnerable to cyber-attacks if transmitted over public networks.

When done correctly, data encryption renders personal data unreadable to those who don’t have outside access. Once that data is encrypted, it becomes safeguarded, mitigating unnecessary risks. 

IoT security data encryption

Additional benefits to data encryption

How to encrypt data in IoT devices

There are a few data encryption techniques available to secure IoT devices from threats. Here are some of the most popular techniques:

Triple Data Encryption Standard (Triple DES): Uses three rounds of encryption to secure data, offering a high-level of security used for mission-critical applications.

Advanced Encryption Standard (AES): A commonly used encryption standard, known for its high security and performance. This is used by the US federal government to protect classified information.

Rivest-Shamir-Adleman (RSA): This is based on public and private keys, used for secure data transfer and digital signatures.

Each encryption technique has its strengths, but it is crucial to choose what best suits the specific requirements of your business.

Encryption support with Erlang/Elixir

When implementing data encryption protocols for IoT security, Erlang and Elixir offer great support to ensure secure communication between IoT devices.
The capabilities that make them ideal for IoT applications are:

  1. Concurrent and fault-tolerant nature: Erlang and Elixir have the ability to handle multiple concurrent connections and processes at the same time. This ensures that encryption operations do not bottleneck the system, allowing businesses to maintain high-performing, reliable systems through varying workloads. 
  2. Built-in libraries: Both languages come with powerful libraries, providing effective tools for implementing encryption standards, such as AES and RSA.
  3. Scalable: Both systems are inherently scalable, allowing for secure data handling across multiple IoT devices. 
  4. Easy integration: The syntax of Elixir makes it easier to integrate encryption protocols within IoT systems. This reduces development time and increases overall efficiency for businesses.

Erlang and Elixir can be powerful tools for businesses, enhancing the security of IoT devices and delivering high-performance systems that ensure robust encryption support for peace of mind.

Read more about IoT security with Erlang and Elixir here >>

3) Regular IoT inventory audits

Performing regular security audits of your systems can be critical in protecting against vulnerabilities. Keeping up with the pace of IoT innovation often means some IoT security considerations get pushed to the side. But identifying weaknesses in existing systems allows organisations to implement a much-needed strategy.

Types of IoT security testing

We’ve explained how IoT audits are key in maintaining secure systems. Now let’s take a look at some of the common types of IoT security testing options available:

IoT security testing

IoT security testing types

Firmware software analysis

Firmware analysis is a key part of IoT security testing. It explores the firmware, the core software embedded into the IoT hardware of IoT products (routers, monitors etc). Examining the firmware means security tests can identify any system vulnerabilities, that might not be initially apparent. This improves the overall security of business IoT devices.

Threat modelling

In this popular testing method, security professionals create a checklist based on potential attack methods, and then suggest ways to mitigate them. This ensures the security of systems by offering analysis of necessary security controls.

IoT penetration testing

This type of security testing finds and exploits security vulnerabilities in IoT devices. IoT penetration testing is used to check the security of real-world IoT devices, including the entire ecosystem, not just the device itself.

Incorporating these testing methods is essential to help identify and mitigate system vulnerabilities. Being proactive and addressing these potential security threats can help businesses maintain secure IoT infrastructure, enhancing operational efficiency and data protection.

4) Training and educating your workforce

Employees can be an entry point for network threats in the workplace. 

The time of BYOD (bring your own devices) where an employee’s work supplies would consist of their laptops, tablets and smartphones in the office to assist with their tasks, is long gone. Now, personal IoT devices are also used in the workplace. Think of your popular wearables like smartwatches, fitness trackers, e-readers and portable game consoles. Even portable appliances like smart printers and smart coffee makers are increasingly popular in office spaces.

Example of increasing IoT devices in the office. Source: House of IT

The use of various IoT devices throughout your business network is the most vulnerable target for cybercrime, using techniques such as phishing and credential hacking or malware. 

Phishing attempts are among the most common. Even the most ‘tech-savvy’ person can fall victim to them. Attackers are skilled at making phishing emails seem legitimate, forging real domains and email addresses to appear like a legitimate business. 

Malware is another popular technique concealed in email attachments, sometimes disguised as Microsoft documents, unassuming to the recipient.

Remote working and IoT business security

Threat or malicious actors are increasingly targeting remote workers. Research by Global Newswire shows that remote working increases the frequency of cyber attacks by a staggering 238%.

The nature of remote employees housing sensitive data on various IoT devices makes the need for training even more important. There is now a rise in companies moving to secure personal IoT devices that are used for home working, with the same high security as they would corporate devices.

How are they doing this? IoT management solutions. They provide visibility and control over other IoT devices. Key players across the IoT landscape are creating increasingly sophisticated IoT management solutions, helping companies administer and manage relevant updates remotely.

The use of IoT devices is inevitable if your enterprise has a remote workforce. 

Regular remote updates for IoT devices are essential to ensure the software is up-to-date and patched. But even with these precautions, you should be aware of IoT device security risks and take steps to mitigate them.

Importance of IoT training

Getting employees involved in the security process encourages awareness and vigilance for protecting sensitive network data and devices.

Comprehensive and regularly updated education and training are vital to prepare end-users for various security threats. Remember that a business network is only as secure as its least informed or untrained employee.

Here are some key points employees need to know to maintain IoT security:

  • The best practices for security hygiene (for both personal and work devices and accounts).
  •  Common and significant cybersecurity risks to your business.
  • The correct protocols to follow if they suspect they have fallen victim to an attack.
  • How to identify phishing, social engineering, domain spoofing, and other types of attacks.

Investing the time and effort to ensure your employees are well informed and prepared for potential threats can significantly enhance your business’s overall IoT security standing.

5) Disable unused features to ensure IoT security

Enterprise IoT devices come with a range of functionalities. Take a smartwatch, for example. Its main purpose as a watch is of course to tell the time, but it might also include Bluetooth, Near-Field Communication (NFC), and voice activation. If you aren’t using these features, then you’re opening yourself up for hackers to potentially breach your device. Deactivation of unused features reduces the risk of cyberattacks, as it limits the ways for hackers to breach these devices.

Benefits of disabling unused features

If these additional features are not being used, they can create unnecessary security vulnerabilities. Disabling unused features helps to ensure IoT security for businesses in several ways:

  1. Reduces attack surface: Unused features provide extra entry points for attackers. Disabling features limits the number of potential vulnerabilities that could be exploited, in turn reducing attacks overall.
  2. Minimises risk of exploits: Many IoT devices come with default settings that enable features which might not be necessary for business operations. Disabling these features minimises the risk of weak security.
  3. Improves performance and stability: Unused features can consume resources and affect the performance and stability of IoT devices. By disabling them, devices run more efficiently and are less likely to experience issues that could be exploited by attackers.
  4. Simplifies security management: Managing fewer active features simplifies security oversight. It becomes simpler to monitor and update any necessary features.
  5. Enhances regulatory compliance: Disabling unused features can help businesses meet regulatory requirements by ensuring that only the necessary and secure functionalities are active.

To conclude

The continued adoption of IoT is not stopping anytime soon. Neither are the possible risks. Implementing even some of the five tips we have highlighted can significantly mitigate the risks associated with the growing number of devices used for business operations.

Ultimately, investing in your business’s IoT security is all about safeguarding the entire network, maintaining the continuity of day-to-day operations and preserving the reputation of your business. Want to learn more about keeping your IoT offering secure? Don’t hesitate to drop the Erlang Solutions team a message.

The post Top 5 IoT Business Security Basics appeared first on Erlang Solutions.

by Erlang Solutions Team at February 27, 2025 12:21

February 20, 2025

Erlang Solutions

Highlights from Code BEAM Lite London 2025

The inaugural Code BEAM Lite London conference was held at CodeNode last month, featuring 10 talks, 80 attendees, and an Erlang Solutions booth. There, attendees had the chance to set a high score in a BEAM-based asteroid game created by ESL’s Hernán Rivas Acosta, and win an Atari replica.

Learning from and networking with experts across the BEAM world was an exciting opportunity. Here are the highlights from the talks at the event.

Keynote: Gleam’s First Year

Louis Pilfold kicked things off with an opening keynote all about Gleam, the statically-typed BEAM language he designed and developed, and which announced its version 1.0 a year ago at FOSDEM in Brussels. 

Louis laid out the primary goals of v1: productivity and sustainability, avoiding breaking changes and language bloat, and extensive, helpful, and easily navigable documentation. He then walked us through some of the progress made on Gleam in its first year of official release, with a particular focus on the many convenience and quality-of-life features of the language server, written in Rust. Finally, he measured Gleam’s success throughout 2024 in terms of Github usage and sponsorship money and looked forward to his goals for the language in 2025.

Louis Pilfold starting his keynote talk

The Art of Writing Beautiful Code

“Make it work, then make it beautiful, then if you really, really have to, make it fast. 90 per cent of the time, if you make it beautiful, it will already be fast. So really, just make it beautiful!” Most of us are likely familiar with this famous Joe Armstrong quote, but what does it actually mean to write beautiful code? 

This question was the focus of Brujo Benavides’ talk, a tour through various examples of “ugly” code in Erlang, some of which may well be considered beautiful by programmers trying to avoid repeating code. If beauty is in the eye of the beholder, what’s more important is that each project has a consistent definition of what “beautiful” means. Brujo explored different methods of achieving this consistency, and how to balance it with the need for fast commits of important changes in a project.

Why Livebook is My Dream Data Science Workbench

Amplified’s Christopher Grainger took a more cerebral approach to his talk on Livebook, drawing on his background as both a historian and a data scientist to link the collaborative notebook software to a tradition of scientific collaboration dating back thousands of years. 

In his view, the fragmentation of the digital age led to key components of this tradition being lost; he explored how LiveBook’s BEAM architecture brings it closer to being a digital equivalent of real-time collaboration in a lab than prior technologies like Jupyter Notebooks, and what further steps could be taken to get even closer to it in the future.

Deploying Elixir on Azure With Some Bonus Side Quests

Matteo Gheri of Pocketworks provided an industrial example of Elixir in action, explaining how his company used Azure in the course of building a Phoenix app for UK-based taxi company Veezu. 

Azure is used to host only 3.2% of Elixir apps, and Matteo walked through their journey figuring it out in detail, touching on deployment, infrastructure, CI/CD, and the challenges they encountered.

Let’s Talk About Tests

Erlang Solutions’ own Natalia Chechina took the stage next for a dive into the question of tests. She explored ways of convincing managers of the importance of testing, which types of test to prioritise depending on the circumstances of the project, and how to best structure testing in order to prevent developers from burning out, stressing the importance of both making testing a key component of the development cycle and cultivating a positive attitude towards testing.

Eat Your Greens: A Philosophy for Language Design

Replacing Guillaume Duboc’s cancelled talk on Elixir types was Peter Saxton, developer of a new language called Eat Your Greens (EYG). The philosophy behind the title refers to doing things that may be boring or unenjoyable but which lead to benefits in the long run, such as eating vegetables; Peter cited types as an example of this, and as such EYG is statically, structurally, and soundly typed. He then walked through other main features of his language, such as closure serialisation as JSON, hot code reloading, and the ability for it to be run entirely through keyboard shortcuts.

Trade-Offs Using JSON in Elixir 1.18: Wrappers vs. Erlang Libraries

Michał Muskała has a long history working with JSON on the BEAM, starting with his development of the Jason parser and generator, first released in 2017. He talked us through that history; writing Jason, turning his focus to Erlang/OTP and proposing a JSON module there, and then building on that for the Elixir JSON module, now part of the standard library in 1.18. 

He discussed the features of this new module, why it was better to use wrappers while transitioning to Elixir instead of calling Erlang directly, and how to simplify migration from Jason to JSON in advance of OTP 27 eventually being required by Elixir.

Distributed AtomVM: Let’s Create Clusters of Microcontrollers

A useless machine and a tiny, battery-free LED device played central roles in Paul Guyot’s dive into AtomVM, an Erlang- and Elixir-based virtual machine for microcontrollers. He kicked off by demonstrating La machine, the first commercial AtomVM product, albeit without an internet connection, before explaining AtomVM’s intended use in IoT devices, and the recent addition of distributed Erlang. This was backed up by another demonstration, this time of the appropriately named “2.5g of Erlang” device. Finally, he explained AtomVM’s advantages compared to other IoT VMs and identified the next steps for the project.

Erlang and RabbitMQ: The Erlang AMQP Client in Action

Katleho Kanyane from Erlang Solutions then provided another industry use case, discussing how he helped to implement a RabbitMQ publisher using the Erlang AMQP client library while working with a large fintech client. Katleho talked through some of the basics of RabbitMQ implementation, best practices, and two issues he ran into involving flow control, an overload prevention feature in RabbitMQ that throttles components and leads to drastically reduced transfer rates. He wrapped up by discussing lessons he learned from the process and laying out a few guidelines for designing a publisher.

Keynote: Introducing Tau5 – A New BEAM-Powered Live Coding Platform

The closing keynote was also the only talk of the day to kick off with a music video, though that should be expected when live coding artist and Sonic Pi creator Sam Aaron is the one delivering it. Sam spoke passionately about his goal to make programming something that everyone should be able to try without needing or wanting to become a professional and discussed his history of using Sonic Pi’s live coding software in education, including how he worked some complicated concepts such as concurrency in without confusing students or teachers.

He then discussed the limitations of Sonic Pi and how they are addressed by his new project, Tau5. While still in the proof-of-concept stage, Tau5 improves on Sonic Pi by being built on OTP from the ground up, being able to run in the browser, and including new features like visuals to add to live performances. He concluded with a demonstration of Tau5 and an explanation of his intentions for the project.

Final Thoughts

Code BEAM Lite London 2025 was a fantastic day filled with fascinating talks, cool demos, and plenty more to excite any BEAM enthusiast.

From hearing about the latest Gleam developments to diving into live coding with Tau5, it was clear that the community is thriving and full of creative energy. Whether it was learning tips for practical BEAM use or exploring cutting-edge new tools and languages, there was something for everyone.

If you missed out this time, don’t worry: you’ll be welcome at the next one, and we hope to see you there. Until then, keep building, keep experimenting, and above all keep having fun with the BEAM!

The post Highlights from Code BEAM Lite London 2025 appeared first on Erlang Solutions.

by Rhys Davey at February 20, 2025 12:08

February 13, 2025

Kaidan

Kaidan 0.11.0: Qt 6

Kaidan supports Qt 6 now! In addition, this release improves the user interface and fixes some bugs. Have a look at the changelog for more details.

Changelog

Features:

  • Highlight public XMPP provider titles while card is expanded (melvo)
  • Round corners of cards and buttons (melvo)
  • Add fading in/out hover effect to map previews (melvo)
  • Collapse contact profiles by default if they have more than 3 entries (melvo)
  • Show colored check mark for delivered messages instead of none to avoid message bubble resizing (melvo)

Bugfixes:

  • Fix opening public MUC-based group chats via another XMPP client (melvo)
  • Fix playing voice messages and changing playing position (melvo)
  • Fix updating message reactions that could not be sent instead of adding them a second time (melvo)
  • Fix updating group chat users in user interface (melvo)
  • Fix displaying message reaction details (melvo)
  • Update filtering contacts by labels even if label list is not open anymore (melvo)
  • Fix scrolling media overview (melvo)
  • Fix updating draft messages (melvo)

Notes:

  • Kaidan requires Qt 6.6 now (mlaurent, melvo, fazevedo, plata)

Download

Or install Kaidan for your distribution:

Packaging status

February 13, 2025 23:00

February 12, 2025

Erlang Solutions

DORA Compliance: What Fintech Businesses Need to Know

The Digital Operational Resilience Act (DORA) is now in effect as of 17th January 2025, making compliance mandatory for fintech companies, financial institutions, and ICT providers across the UK and EU. With over 22,000 businesses impacted, DORA sets clear expectations for how firms must manage operational resilience and protect against cyber threats.

As cybercriminals become more sophisticated, regulatory action has followed. DORA is designed to ensure that businesses have the right security measures in place to handle disruptions, prevent data breaches, and stay operational under pressure.

Yet, despite having time to prepare, 43% of organisations admit they won’t be fully compliant for at least another three months. But non-compliance isn’t just a delay. It comes with serious risks, including penalties and reputational damage.

So, what does DORA mean for your fintech business? Why is compliance so important, and how can you make sure you meet the requirements?

What is DORA?

With technology at the heart of financial services, the risks associated with cyber threats and ICT disruptions have never been higher. The European Parliament introduced the Digital Operational Resilience Act (DORA) to strengthen the financial sector’s ability to withstand and recover from these digital risks.

Originally drafted in September 2020 and ratified in 2022, DORA officially came into force in January 2025. It establishes strict requirements for managing ICT risks, ensuring financial institutions follow clear protection, detection, containment, recovery, and repair guidelines. 

A New Approach to Cybersecurity

This regulation marks a major step forward in cybersecurity, prioritising operational resilience to keep businesses running even in the face of severe cyber threats or major ICT failures. Compliance will be monitored through a unified supervisory approach, with the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA), and the European Securities and Markets Authority (ESMA) working alongside national regulators to enforce the new standards.

A report from the European Supervisory Authorities (EBA, EIOPA, and ESMA) highlighted that in 2024, of the registers analysed during a ‘dry run’ exercise involving nearly 1,000 financial entities across the EU, just 6.5% passed all data quality checks. This shows just how demanding the requirements are, and the importance of getting it right early for a smooth path to compliance.

The Five Pillars of DORA

DORA introduces firm rules on ICT risk management, incident reporting, resilience testing, and oversight of third-party providers. Rather than a one-size-fits-all approach, compliance depends on factors like company size, risk tolerance, and the type of ICT systems used. However, at its core, DORA is built around five key pillars that form the foundation of a strong operational resilience framework.

Five Pillars of DORA for business

Source: Zapoj

These pillars also serve as the basis for a DORA compliance checklist, which businesses can use to ensure they meet regulatory requirements.

Below is a breakdown of each pillar and what businesses need to do to comply:

1. ICT Risk Management

Businesses must establish a framework to identify, assess, and mitigate ICT risks. This includes:

  • Conducting regular risk assessments to spot vulnerabilities.
  • Implementing security controls to address identified risks.
  • Developing a clear incident response plan to handle disruptions effectively.

2. ICT-Related Incident Reporting

Companies must have structured processes to detect, report, and investigate ICT-related incidents. This involves:

  • Setting up clear reporting channels for ICT issues.
  • Classifying incidents by severity to determine response urgency.
  • Notifying relevant authorities promptly when serious incidents occur.

3. Digital Operational Resilience Testing

Financial institutions are required to test their ICT systems regularly to ensure they can withstand cyber threats and operational disruptions. This includes:

  • Running simulated attack scenarios to test security defences.
  • Assessing the effectiveness of existing resilience measures.
  • Continuously improving systems based on test results.

4. ICT Third-Party Risk Management

DORA highlights the importance of managing risks linked to third-party ICT providers. Businesses must:

  • Conduct due diligence before working with external service providers.
  • Establish contractual agreements outlining security expectations.
  • Continuously monitor third-party performance to ensure compliance.

5. Information Sharing

Collaboration is a key part of DORA, with financial institutions encouraged to share cyber threat intelligence. This may include:

  • Participating in industry forums to stay informed about emerging threats.
  • Sharing threat intelligence with peers to strengthen collective defences.
  • Conducting joint cybersecurity exercises to improve incident response.

By following these five pillars, businesses can build a strong foundation for digital resilience. Compliance isn’t just about meeting regulatory requirements, it’s about safeguarding operations, protecting customers, and strengthening the financial sector against growing cyber threats.

How to Achieve DORA Compliance for Your Business

Regardless of the stage of compliance a business is in, there are a few key areas that must be focused on to protect themselves. Here’s what you need to do:

Understand DORA’s Scope and Requirements

The first step to DORA compliance is understanding what’s required. Take the time to familiarise yourself with its requirements and ask any questions.

Conduct a Risk Assessment

A solid risk assessment is at the heart of DORA compliance. Identify and evaluate risks across your ICT systems—this includes everything from cyber threats to software glitches. Understanding these risks helps you plan how to minimise their impact on your operations.

Create a Resilience Strategy

With your risk assessment in hand, develop a tailored resilience strategy. This should include:

  • Preventive Measures: Set up cyber defences and redundancy systems to prevent disruptions.
  • Detection Systems: Ensure you can quickly spot any anomalies or threats.
  • Response and Recovery Plans: Have clear plans in place to respond and recover if an incident happens.

Invest in Cybersecurity and IT Infrastructure

To meet DORA compliance for business, invest in strong cybersecurity tools like firewalls and encryption. Ensure your IT infrastructure is resilient, with reliable backup and recovery systems to minimise disruptions.

Strengthen Incident Reporting

DORA stresses the importance of quick and accurate incident reporting. Establish clear channels for detecting and reporting ICT incidents, ensuring timely updates to authorities when needed.

Build a Culture of Resilience

Resilience is an ongoing effort. To stay compliant, create a culture where resilience is top of mind:

  • Provide regular staff training.
  • Regularly test and audit your systems.
  • Stay updated on emerging risks and technologies.

Partner with IT Experts

DORA compliance can be tricky, especially if your team lacks in-house expertise. Partnering with IT service providers who specialise in compliance can help you meet DORA’s requirements more smoothly.

Consequences for Non-Compliance 

We’ve already established the importance of meeting DORA’s strict mandates. But failing to comply with these regulations can have serious consequences for businesses- from hefty fines to operational restrictions. Here’s what businesses need to be aware of to protect their organisation:

Fines for Non-Compliance

  • Up to 2% of global turnover or €10 million, whichever is higher, for non-compliant financial institutions.
  • Third-party ICT providers could face fines as high as €5 million or 1% of daily global turnover for each day of non-compliance.
  • Failure to report major incidents within 4 hours can lead to further penalties.

Reputational Damage and Leadership Liability

  • Public notices of breaches can cause lasting reputational damage, affecting business trust and relationships.
  • Business leaders can face personal fines of up to €1 million for failing to ensure compliance.

Operational Restrictions

  • Regulators can limit or suspend business activities until compliance is achieved.
  • Data traffic records can be requested from telecommunications operators if there’s suspicion of a breach.

Technology Choices and Architectural Considerations

Compliance with DORA isn’t just about testing. It also depends on the technology stack and system architecture. Choosing technologies designed for security, reliability, and fault tolerance makes meeting regulatory requirements easier and improves overall system resilience.

The Elixir/Erlang/BEAM/OTP ecosystem is built for high availability, fault tolerance, and concurrency. The BEAM virtual machine, which runs Erlang and Elixir, is designed to keep systems running even when failures occur. This makes it a strong choice for financial services that require constant uptime and security.

How Elixir/Erlang/BEAM Improve Security and Resilience

Elixir and Erlang have very few recorded vulnerabilities in the Common Vulnerabilities and Exposures (CVE) database. Their architecture is designed to limit attack surfaces and contain failures. Here’s how they help:

FeatureBenefitHow It Helps with DORA Compliance
Isolated ProcessesA failure in one part of the system doesn’t crash everything.Improves system stability and limits security risks.
Hot Code SwappingUpdates can be applied without restarting the system.Keeps systems secure without downtime.
ConcurrencyHandles multiple tasks at once with minimal resource use.Ensures smooth performance, even under heavy load.
Self-HealingFaults are detected and recovered from automatically.Reduces downtime and improves resilience.
Low CVE CountFewer known security vulnerabilities compared to other platforms.Lowers the risk of cyberattacks.

How Erlang Solutions Can Help You with DORA Compliance

Don’t panic, prioritise. If you’ve identified that your business may be at risk of non-compliance, taking action now is key. Erlang Solutions can support you in meeting DORA’s requirements through our Security Audit for Erlang and Elixir (SAFE) and expertise with Erlang and Elixir ecosystems.

With extensive experience in the financial sector, we understand the critical need for resilient, scalable systems. Our expertise with Erlang and Elixir has helped leading fintech institutions, including Klarna, Vocalink, and Ericsson, build fault-tolerant, high-performing and compliant systems.

SAFE is aligned with several key areas of DORA, including ICT risk management, resilience testing, and third-party risk management:

  • Proactive Risk Identification and Mitigation: SAFE identifies vulnerabilities and provides recommendations to address risks before they become critical. This proactive approach supports DORA’s requirements for continuous ICT risk management.
  • Continuous Monitoring Capabilities: SAFE allows ongoing monitoring of your systems, which aligns with DORA’s emphasis on continuous risk detection and mitigation.
  • Detailed Incident Response Recommendations: SAFE’s detailed findings help you refine your incident response and recovery plans, ensuring your systems are prepared to quickly recover from cyberattacks or disruptions.

Third-Party Risk Management: The security audit can provide insights into your third-party integrations, helping to ensure they meet necessary security standards and comply with DORA’s requirements.

Conclusion

DORA compliance is now in effect, making it essential to act if your business isn’t fully compliant. Delays can lead to penalties and increased risk exposure. Prioritising ICT risk management, strengthening resilience, and ensuring proper incident reporting will bring you closer to compliance. But this isn’t just about meeting requirements, it’s about safeguarding your organisation and building long-term operational resilience.

If you have compliance concerns or just want to talk through your next steps, we’re here to help. Contact us to talk through your options.  

The post DORA Compliance: What Fintech Businesses Need to Know appeared first on Erlang Solutions.

by Erlang Solutions Team at February 12, 2025 16:35

The XMPP Standards Foundation

XMPP Summit 27 Report

XMPP Summit 27 - January 2025

For this year’s XMPP Summit 27, real time communication enthusiasts gathered in Brussels (Belgium, EU) to discuss a wide range of XMPP topics.

Topics included:

  • GC3 (a new group chat protocol)
  • HTTP Upload retention
  • Service Discovery updates
  • User account configuration
  • Spam reporting
  • OMEMO device management
  • MIMI/MLS (encryption)
  • IMNG
  • MUC Push
  • Updates from the Editor
  • Talks about XMPP and the EU, about reducing pre-connection roundtrips, and about experimenting with remote control of (Galene) video conferences

A detailed report can be found at mathieui’s blog.

February 12, 2025 00:00

February 07, 2025

ProcessOne

Join our community: Free Memberships now available

We’re excited to announce a new way to connect with our community at process-one.net. As of today, we’ve enabled free memberships on our site, giving you even more ways to stay updated, interact, and engage with our content.

Why Sign Up?

By becoming a member, you get access to specific benefits, including:

  • The ability to engage with our content in new ways, such as commenting on posts, participating in discussions like we did before and receiving exclusive insights.
  • A direct connection to the ProcessOne team and the latest updates on ejabberd, Fluux.io, technical insights and our other projects.
  • Email notifications when new articles are published.

Ghost’s (our blogging platform, right here) membership is designed to help build an engaged community. It allows users to stay informed, participate actively, and create a closer connection —without any cost or commitment, while ensuring our content remains valuable to a genuine human audience. It means we are re-enabling comments here (disabled while we switched away from our Wordpress instance), which is the most important aspect of this membership.

We have no plans for paid memberships; our goal is simply to share updates about our projects and the XMPP ecosystem. Additionally, we respect your privacy—your email will only be used to notify you about new content, and we will never sell or misuse it.

It&aposs Free and easy to join.

Signing up is completely free—just create an account and start enjoying the benefits right away. No strings attached!

Prefer RSS? We’ve Got You Covered

If you prefer to follow updates through RSS, you can always subscribe to our feed and get the latest content delivered straight to your reader of choice. Subscribe over here. ;).

We’re always looking for new ways to enhance the experience for our readers, and this is just the beginning. We hope you’ll join us and be part of our growing community!

Sign up today and stay connected!

by Adrien at February 07, 2025 14:11

The XMPP Standards Foundation

The XMPP Newsletter January 2025

XMPP Newsletter Banner

XMPP Newsletter Banner

Welcome to the XMPP Newsletter, great to have you here again! This issue covers the month of January 2025.

Like this newsletter, many projects and their efforts in the XMPP community are a result of people’s voluntary work. If you are happy with the services and software you may be using, please consider saying thanks or help these projects! Interested in supporting the Newsletter team? Read more at the bottom.

XSF Announcements

XSF Membership

If you are interested in joining the XMPP Standards Foundation as a member, please apply until February 16th, 2025, 00:00 UTC!.

XMPP Summit 27

The XSF held its 27th XMPP Summit on January 30th & 31st 2025 in Brussels (Belgium, Europe). During this two-day gathering, we discussed XMPP protocol development topics and kept making progress on current issues within the protocol and ecosystem. We would like to thank everyone that took part of the Summit for their continuous commitment and contribution to the XSF and all the XMPP related projects!

The XSF would like to extend a special thank you to those who made the Summit possible:

  • Daniel Gultsch for his time and resources to help organizing the event.
  • Alexander Gnauck and Dave Cridland for sponsoring the XSF Dinner.
  • Ralph Meijer for his time and dedicated work on streaming/swag/booking dinner.
  • Edwin Mons for the dinner form.
  • Kevin Smith for leading the Summit and moderating the speakers.
  • Alex Palaistras for keeping up a record on the pad with all the topics and the feedback during the entire Summit.
  • Isode for sponsoring the XMPP Summit again.
Welcome to the 27th XMPP Summit!

Welcome to the 27th XMPP Summit!

You can find a summary of the main topics discussed over the course of the Summit here.

XSF Fiscal Hosting Projects

The XSF offers fiscal hosting for XMPP projects. Please apply via Open Collective. For more information, see the announcement blog post. Current projects you can support:

XMPP Events

Talks

XMPP Articles

XMPP Software News

XMPP Clients and Applications

  • Conversations has released versions 2.17.8 and 2.17.9 for Android.
  • Monal has released version 6.4.9 and 6.4.10 for iOS an macOS.
  • Monocles Chat 2.0.4 has been released for Android. This version brings in several fixes.
  • Cheogram has released version 2.17.2-4 for Android.
  • Movim 0.29 and 0.29.1 have been released. Movim 0.29 (code named “Rankin”) is the first XMPP client that implements “Stories” (XEP-0501 (Pubsub Stories)), a very nice way to share content with your contacts and allow them to react easily by chat. It also introduces “Briefs”, a simpler way to create a short publication that only consists of a text and some medias on your profile or in your Communities. Version 0.29.1 comes with a more polished and improved “Stories” feature, database fixes as well as some preparatory work for the PHP 8.4 version. To learn more about this releases, head over to the Movim Blog.
Movim 0.29 (Rankin) introducing Stories!

Movim 0.29 (Rankin) introducing Stories!

Movim 0.29 (Rankin) introducing Briefs!

Movim 0.29 (Rankin) introducing Briefs!

XMPP Servers

  • MongooseIM has released version 6.3.1 of its Enterprise Instant Messaging Solution.

XMPP Libraries & Tools

Extensions and specifications

The XMPP Standards Foundation develops extensions to XMPP in its XEP series in addition to XMPP RFCs. Developers and other standards experts from around the world collaborate on these extensions, developing new specifications for emerging practices, and refining existing ways of doing things. Proposed by anybody, the particularly successful ones end up as Final or Active - depending on their type - while others are carefully archived as Deferred. This life cycle is described in XEP-0001, which contains the formal and canonical definitions for the types, states, and processes. Read more about the standards process. Communication around Standards and Extensions happens in the Standards Mailing List (online archive).

Proposed

The XEP development process starts by writing up an idea and submitting it to the XMPP Editor. Within two weeks, the Council decides whether to accept this proposal as an Experimental XEP.

  • GRE Formatter: MIME
    • This GRE Formatter uses Multipurpose Internet Mail Extensions (MIME) to format payload.
  • GRE Encrypter: OpenPGP
    • This GRE Encrypter uses OpenPGP to encrypt payload.
  • Gateway Relayed Encryption
    • This specification describes a mechanism for end-to-end encryption with gateways that is compatible with third-party networks.

New

  • No new XEPs this month.

Deferred

If an experimental XEP is not updated for more than twelve months, it will be moved off Experimental to Deferred. If there is another update, it will put the XEP back onto Experimental.

  • No XEPs deferred this month.

Updated

  • Version 0.4.2 of XEP-0424 (Message Retraction)
    • Use a XEP-0425 /me command in the fallback body
    • State that a tombstone’s <retracted/> element’s ‘id’ attribute should match the retraction message’s ‘id’.
    • Specify XEP-0359 as a dependency and require that the stanza ‘id’ be used instead of the origin-id.
    • Update the “Security Considerations” to mention the risk of non-unique message IDs. (jcb)
  • Version 0.4.0 of XEP-0474 (SASL SCRAM Downgrade Protection)
    • Use better value delimiter (tm)

Last Call

Last calls are issued once everyone seems satisfied with the current XEP status. After the Council decides whether the XEP seems ready, the XMPP Editor issues a Last Call for comments. The feedback gathered during the Last Call can help improve the XEP before returning it to the Council for advancement to Stable.

  • Last Call for comments on XEP-0484 (Fast Authentication Streamlining Tokens).
    • This Last Call shall end at the close of business on 2025-01-27

Stable

  • Version 1.0.0 of XEP-0421 (Occupant identifiers for semi-anonymous MUCs)
    • Accept as Stable as per Council Vote from 2025-01-14. (XEP Editor(dg))

Deprecated

  • No XEPs deprecated this month.

Rejected

  • No XEPs rejected this month.

Spread the news

Please share the news on other networks:

Subscribe to the monthly XMPP newsletter
Subscribe

Also check out our RSS Feed!

Looking for job offers or want to hire a professional consultant for your XMPP project? Visit our XMPP job board.

Newsletter Contributors & Translations

This is a community effort, and we would like to thank translators for their contributions. Volunteers and more languages are welcome! Translations of the XMPP Newsletter will be released here (with some delay):

  • English (original): xmpp.org
    • General contributors: Adrien Bourmault (neox), Alexander “PapaTutuWawa”, Arne, cal0pteryx, emus, Federico, Gonzalo Raúl Nemmi, Jonas Stein, Kris “poVoq”, Licaon_Kter, Ludovic Bocquet, Mario Sabatino, melvo, MSavoritias (fae,ve), nicola, Schimon Zachary, Simone Canaletti, singpolyma, XSF iTeam
  • French: jabberfr.org and linuxfr.org
    • Translators: Adrien Bourmault (neox), alkino, anubis, Arkem, Benoît Sibaud, mathieui, nyco, Pierre Jarillon, Ppjet6, Ysabeau
  • Italian: notes.nicfab.eu
    • Translators: nicola
  • Spanish: xmpp.org
    • Translators: Gonzalo Raúl Nemmi
  • German: xmpp.org
    • Translators: Millesimus

Help us to build the newsletter

This XMPP Newsletter is produced collaboratively by the XMPP community. Each month’s newsletter issue is drafted in this simple pad. At the end of each month, the pad’s content is merged into the XSF GitHub repository. We are always happy to welcome contributors. Do not hesitate to join the discussion in our Comm-Team group chat (MUC) and thereby help us sustain this as a community effort. You have a project and want to spread the news? Please consider sharing your news or events here, and promote it to a large audience.

Tasks we do on a regular basis:

  • gathering news in the XMPP universe
  • short summaries of news and events
  • summary of the monthly communication on extensions (XEPs)
  • review of the newsletter draft
  • preparation of media images
  • translations
  • communication via media accounts

Unsubscribe from the XMPP Newsletter

To unsubscribe from this list, please log in first. If you have not previously logged in, you may need to set up an account with the appropriate email address.

License

This newsletter is published under CC BY-SA license.

February 07, 2025 00:00

February 06, 2025

Mathieu Pasquet

XMPP Summit 27 and FOSDEM 25 Report

Here is an account of my trip to FOSDEM & XMPP Summit this year. Note: for privacy reasons on the broader internet, I am keeping names out of my description of the events, but my goal here is not to diminish anyone’s merit.

Glossary

I use a bit of acronyms and jargon in this article because it talks about technical things, so I will define them here:

  • XMPP: eXtensible Messaging and Presence Protocol, the internet standard for instant messaging and much more.
  • XSF: XMPP Software Foundation, the entity guiding the development of XMPP.
  • XEP: XMPP Extension Protocol: the specifications allowing us to build things on top of XMPP.
  • FOSDEM: Free and Open Source Developers European Meeting, one of the biggest free and open source events of the year.
  • MUC: Multi-User-Chat, the XMPP specification described in XEP-0045 which allows multiple users to chat in a room.
  • HTTP Upload: A specification describing how to upload a file using HTTP, through XMPP, defined in XEP-0363.
  • Disco/Discovery: XMPP has a mechanism that allows an entity to send queries to another to learn information about it in an automated manner, described in XEP-0030.
  • NDA: Non-Disclosure Agreement
  • DMA: Digital Markets Act, this is an EU legislation that aims to regulates big providers, naming them "gatekeepers" and allowing smaller entities to access their captive audience.
  • FAST: an authentication method on XMPP using tokens after having used a "standard" authentication mechanism, described in XEP-0484.
  • BIND2: a modern way of obtaining a resource on XMPP, a resource is kind of a specific identifier linked to the current session, described in XEP-0386.
  • SASL: Simple Authentication and Security Layer, a standard authentication framework on the internet.
  • SASL2: An improved SASL mechanism for XMPP that aims at reducing the pain points due to the old design of SASL, described in XEP-0388.
  • starttls: An old way of getting TLS on a connection by upgrading it while it is open.
  • Jingle: A way of doing peer-to-peer exchanges between two XMPP entities
  • PEP: Personal Eventing Protocol, a simplified publish-subscribe mechanisms to broadcast events from users to other users, defined in XEP-0163.
  • GSoC: Google Summer of Code, google pays students to work on open source projects in the summer (terms and conditions may apply).
  • MIMI: an IETF working group working on interoperability in the messaging space.
  • MLS: Messaging Layer Security, a standardized protocol for group chat encryption.

Summit

The XMPP Summit (or just "Summit" as we call it within context) is an event that usually takes place during the two weekdays before FOSDEM, which allows people who plan to go to both to do so in a single trip. This might change in the future as FOSDEM is proving to be both more popular (it seems to get increasingly crowded every year) and less popular (the sheer number of people makes it harder to enjoy for many people).

I have been going to the summit for a few years, previously it was hosted at Cisco Belgium, who graciously allowed us to make use of their facilities, and for the last ones we have been going to the Thon hotel, which is a hotel in Brussels.

Attendance to the summit is free, and the only thing required is to sign up in advance so that the room can be dimensioned properly when booking, and one can always attend using jitsi as there is a great audio/video setup. The summit lasts two days and is an occasion for the diverse - in experiences, goals, roles and focuses - community to meet up and work on specifications or problems together. It is mostly a technical event and I would not recommend attending if discussing and thinking about XMPP specifications is not of interest to you.

The day starts with a trickle of people slowly arriving before and after the announced start time, and setting themselves up in a chair. When all (or almost all) the expected people are there, everyone starts by introducing themselves (name and project(s) at least) and then we can submit topics for discussion. Anyone can submit a topic, and once all the topics have been collected, we go vote by adding a little dot next to it on the whiteboard, in one color if we want to talk about it, and in another if you only want to listen (it is only indicative and of course nobody is going to inquire why you are talking when you said you would be listening).

Then we simply go through the topics in order if there is no specific request or constraint (like someone only being there one day).

Events

What went down this year (in discussed order):

Day 1

  • Groupchat 3.0 (“GC3”)

A plan for "Groupchat 3.0" was outlined, aiming at bringing MUC closer to modern features and what we wanted MIX to be (and trying to avoid feeling like Sisyphus every summit where we discuss MIX again and still go nowhere). The consensus seems to be "let’s try it and see where we land", with some people feeling strongly about the experimentation taking place within the XSF spaces.

Presentation slides

  • HTTP Upload Retention

The problem described here is the need to have a way of having different venues for uploading files over HTTP, such as avatars that we really do not want to map to the default server retention policy, as it is usually a small number of weeks for public deployments. The most likely solution will be a number of "buckets" with some having a limited number of slots - oldest files being purged when a new one arrives -, with different purposes.

  • Server disco optimization

The issue of our recursive disco calls at the beginning of a session was raised, with the idea to avoid having to send tons of stanzas and do a lot of roundtrips to have a client ready. The solution that stood out was to include caps hash and category/type when the server already has it (may not work for external components, for example), that way all the info has a very good chance to be already cached in the client, no request necessary. MattJ also plans to write an information XEP to help implementors navigate this.

  • XMPP, Dutch healthcare, EU DMA

We learnt about the situation of IM in both dutch healthcare and the DMA. There was some discussion about whatsapp and the DMA, and the hoops one would need to jump through to be able to access their API. Basically we need a company providing an XMPP service to say "this hurts our ability to compete" and then enter an NDA relationship with Meta, something most people do not enjoy.

[Lunch at the hotel buffet, very nice]

  • Lightning talk on reducing roundtrips

The efforts of XMPP for reducing the number of network rountrips (FAST, SASL2, etc) on connection establishment were outlined, and the use of SVCB was suggested to go even further. Can be an issue with starttls but we want to sunset it in the future anyway.

  • User Account Configuration

Discussion on where to store account configuration stuff. PEP might seem sensible but there is both the issue of node configuration and advertising in presence, as well as the risk of badly formatted data. Ad-hoc commands to set stuff on the account buys us compatibility with a few clients that implement it.

  • Spam reporting

Presentation of xmppbl.org and various RTBL solutions.

  • Device management (OMEMO)

SASL2/BIND2 allows us to track user devices, leading to a much better user experience in that area. Do we want to link those XEPs together?

  • MIMI/MLS

Some advancement status on MLS for XMPP, and some MIMI. MLS for XMPP will be focused on group chats as it requires strict ordering of messages, something we get for free currently in MUCs, but not so much in direct chats. Some simple conflict resolution protocol might be used in the end for that, but it will need to be defined. Focus on groupchat makes sense since it is where MLS shines compared to groupchat OMEMO, for example.

MIMI has essentially settled on HTTP for exchange between protocols.

[Fancy XSF dinner, great food and people]

Day 2

  • IM Routing NG

The topic started on "let's implement that", and then we went off a tangent by noticing plenty of convoluted routing rules in the RFCs that most people forgot about. The conclusion is still that we should implement it and iron out the quirks then.

  • MUC Push

Planned to be builtin for GC3 (see first item of the first day), but quite tricky to get right in MUC as it is.

  • Additional item: Comment on the process

Call onto authors to use the standards process more and get their XEP to advance once they have been out for long enough with working implementations.

  • Additional item: Jingle File Transfer Last Call

The XEP is stuck process-wide but used widely, and as such could benefit from renewed discussion as well as more pair of eyes to maybe advance it. There are some bits that may never have been used which might be interesting to remove before then.

  • Lightning talk showing remote control through XMPP as well as A/V calling from the terminal

Very cool! And essentially no lag in the remote control.

[Lunch again at the hotel buffet]

We went through all the agenda items faster than usual, so the rest of the day was made of informal discussions and hacking. Some participants went to an IETF meeting that happened close by.

Overall it felt to me like a productive summit; actions were scheduled, problems were discussed, and the future looks good. We were a bit less than the last time, but that is not necessarily a bad thing. I need to prepare a bit earlier next year in order to be up-to-date on the topics to be discussed.

Summit conclusion

Summit is always well-organized, and I have to thank everyone who made it happen. The moderator was great at keeping track of who wants to talk (while inserting some comments in the middle), and everyone who wanted to speak could speak without an issue, even with the occasional finger-counting mishaps. Location is great and the facilities are pleasant to use, although I would note the lack of vegan options for the meals (this can probably be fixed by giving an advance notice), but the vegetarian options were plenty and very good.

There is one glaring issue that I feel like I have to mention if we want to improve as a community, which is not (I believe) rooted in the summit event itself:

Diversity. As I mentioned, while I would not dare say (or even assume) everyone in the room has a similar background, summit is quite representative of XSF membership which is mostly cis, white, and male individuals from western europe (or the US). To me there are a few reasons for this state of things: - We are a FOSS community, most of which have the same issues - Since the XSF is a standards body, we do not have many venues to do outreach, and must rely on individual projects or initiatives to welcome newcomers. One of those venues is GSoC, for which the XSF acts as an umbrella organization. - The "core" XSF community is not growing much, and obviously when there are no newcomers, there are no diverse newcomers. - For newcomers, it can be a bit dauting to join an organization that has a lot of legacy (the sheer number of XEPs), many processes and roles, as well as members that have been there since the dawn of time, and therefore have a lot of synergies and interactions between themselves, in addition to their protocol expertise.

I have no obvious solution, but I would like to keep that in mind. I know there are great people working on XMPP solutions outside of Europe (for example the Prav team in India, there are others in South America, etc), but would there be enough people to have a standards-focused event there? (obviously flying people there from europe, on top of being somewhat of an ecocidal gesture, would miss the point almost entirely)

FOSDEM

After summit comes FOSDEM, this year I decided to only go on saturday, and kept sunday to travel leisurely rather than come back in the evening and get to work on monday morning right away.

I went to see a few talks:

For the stands, one thing that stood out to me was the "Firefox fan bingo" where people were awared points if they joined the "Mozilla AI Discord" and other such crap. The Firefox cookies were still tasty, though.

As always most of the experience is roaming crowded halls, finding people and talking to them. That is a bit tiring, particularly considering the levels of noise in the buildings, but that is unfair to FOSDEM since I am comparing it to CCC, which is bigger as wall as a longer and paying event.

There was plenty of people interested or using XMPP coming to the booth, so that is cool. I met some slixmpp users along the way which is always motivating.

I wish I had taken some time to take more pictures, the weather was very clear for the season in Brussels.

picture of the european parlement and luxemburg plaza in the end of the afternoon

by mathieui at February 06, 2025 21:22

Erlang Solutions

Women in BEAM

In this post, I will share the results of the Women in BEAM 2024 survey. But first, I would like to share my experience in the BEAM community to understand the motivation behind this initiative.

My journey

I’ve been working with Elixir since 2018, but my interest in it wasn’t driven by technical advantages—it was sparked by my experience at my first ElixirConf in Mexico.

Since 2017, I’ve been involved in initiatives supporting women in tech, frequently attending events to learn and observe industry gender gaps. A major challenge I noticed was the barrier of seniority—many talks were difficult to follow for newcomers, and women, already underrepresented (often less than 30% of attendees), could feel even more excluded. Unfortunately, I grew used to this dynamic, but it was always awkward.

In 2018, I was invited to ElixirConf Lite in Mexico City. From the start, I felt welcomed—no barriers, no judgment, just an open and friendly community. Inspired by this inclusivity, I decided to explore Elixir, later falling in love with its technical strengths.

Since then, I’ve combined my passions for diversity in tech and Elixir. A few months ago, I committed to a focused initiative: the survey.

Background

I have been part of the Code BEAM America committee during the last three editions. I know the efforts made to have a gender-balanced panel and promote diversity at the conference, such as the Diversity & Inclusion Programme. Initiatives that have undoubtedly yielded results. 

For example, the following graph corresponds to the number of women at CodeBEAM America since 2015:

Women in BEAM survey results, women at CodeBEAM America

There is an increase between each edition for almost all of them, and there are some, such as the one in March 2021, where the percentage is nearly a quarter. However, getting female speakers remains a challenge every year. 

I know many women working with Elixir and some with Erlang or Gleam. When I invite them to give a talk, their common response is, “Oh! I don’t think I have anything interesting to share”.I know it’s not true, but I don’t blame them because I know the feeling. Sometimes, I have stopped sharing content or talks for fear of not having enough experience, and I often get so nervous that I let the impostor syndrome win.

As I mentioned earlier, my initial reason for getting interested in Elixir was inclusion. During all these years, I have never had a bad experience in the community, which led me to wonder what is behind these barriers. The cultural context has a lot to do with it, and it is not something specific to the BEAM community; however, I was interested in learning more about other women’s perspectives on the topic.
There were a good number of responses for this first edition, and based on the open responses, I decided to focus the results on four main sections: Diversity in Roles, Challenges for Junior Developers, Programming Language Preferences, and Diversity and Inclusion.

Survey Highlights

The survey included many open-ended questions, and while all responses were different, some aspects were repeated across many, so the sections below are grouped based on similar responses.

Diversity in Roles

I decided to start with this section because role diversity is directly related to the topic of role models, which, from my perspective, is a determining factor in promoting greater participation of women in the BEAM community.

According to this article, women occupy only 11% of leadership positions in technology. This represents a barrier for women working in the industry and new generations, who may not easily see themselves reflected in these numbers. Aspiring to a leadership position is much easier when you have an example in mind, whether it’s a public figure, a teacher, a coworker, etc. This also applies to open-source contributions, technical talks, and more.

Therefore, it is essential to highlight the diversity of responses to the question about the primary role.
The majority of women surveyed indicated that they are Software Developers/Engineers. I wasn’t surprised since most women I know in the community play this role, but I was thrilled that this wasn’t the only answer, so let’s dig deeper into those who indicated they played a different role.

Women in BEAM survey results, Diversity in Roles
  • One woman shared that she is dedicated to research and teaching, a direct way to pass on knowledge and experience. BEAM languages are often overlooked in education, as functional programming isn’t typically prioritised, but having a mentor can change that.

A teacher can encourage event participation, recommend key books, and even organise group attendance. Most importantly, integrating Elixir or Erlang into lessons sparks interest in new learners. Research also plays a vital role, inspiring students to explore deeply and cultivate the curiosity we value in the community.

  • There is one mention of a Technical Leader and two of an Engineering Manager, both refer to leadership positions that can represent role models for those aspiring to be team leaders and manage greater responsibilities. It is important to mention that the years of experience are different for the three answers. This breaks the myth that a position is associated with years of experience rather than with the knowledge and value these women bring to a team.
  • One respondent is a student, though her school level isn’t specified, so it’s unclear if she had prior BEAM experience. Still, it’s clear the BEAM community has successfully expanded its reach—not just in the workplace but also among students who can share their enthusiasm with peers and teachers.

Finally, there is a Project Manager answer, which is a big plus for someone working with a team of developers. Experience in the technical side and the technologies used in a project or team allows for a deeper understanding and better technical suggestions; she can encourage attendance at events to improve the team’s skills and promote using BEAM languages ​​in other areas.

Challenges for Junior Developers

This section is interesting as the survey had no direct questions about juniors and their challenges. Still, I decided to add it because there was an open question about how easy it was for women to get a BEAM-related job. Even those who indicated that from their perspective it was easily mentioned that it depends on the years of experience and that for juniors, it is complex because companies prefer to hire someone with previous experience rather than train someone. Let’s analyze the answers: 


Most women surveyed said they had between 3 and 5 years of experience working with a BEAM programming language.

Women in BEAM survey results, Years of Experience

57.1% of the total indicated that they currently have a BEAM-related job, but despite this, 71.4% consider that it is not easy to find job opportunities.

Women in BEAM survey results, BEAM-related job opportunities

The reasons are mainly related to two factors: one is that on popular platforms such as LinkedIn, there are not as many offers as other technologies, and they do not know which other pages or media to look at. The second reason is due to the challenges that juniors face, and we will delve into that one for now.

“It is difficult to get a job because (BEAM technologies) are not broadly used, and it is harder for many people to have previous production experience.”

Many of the responses in this section agree that it is relatively easy to get a BEAM job when you already have at least two years of experience.

“If you are a junior developer, getting a job is very hard / Most companies only offer senior positions.”

I understand the problem, and in the end, it becomes a vicious circle: someone with no experience can’t get a job, but how can she get it if she can’t join a team? So, talking about external expertise beyond what a company can provide is essential.

I love working with Elixir because you can start a project from scratch and see results quickly. The documentation and resources—tutorials, blogs, and books—are excellent, and the same likely applies to languages like Gleam.

You can build experience through personal projects, coding challenges, or even creating a website. I enjoy writing to reinforce my learning, and if you do too, I encourage you to start a blog—it’s a great way to gain experience and make yourself visible.

Here are some resources to get you started:

Another indirect way to gain experience is by attending events. The 68.6% of women surveyed stated that they like attending virtual and in-person events, and 28.6% indicated that they only like virtual events. 

Women in BEAM survey results, BEAM events

Attending meetups and conferences helps you learn about current technical challenges, BEAM updates, etc. Even if you are starting, it will give you an idea of ​​the topics you can focus on.

These actions may seem irrelevant since they are not the same as saying that you have x years of experience in a company, but they will undoubtedly make a difference. They will also help you find the area where you would like to specialize or learn more, get to know the community, and open the possibility of finding mentors.

Programming Language Preferences

I’m an Elixir developer, so I initially decided to focus the survey on just that programming language, as it’s familiar to me. However, seeing content about Erlang and Gleam in the community is becoming more common, so I decided not to limit it, and I was pleasantly surprised by the diversity of responses.


Most women indicated that Elixir is the primary programming language they use, but it was not the only one. In this question, 14.3% indicated they work with Erlang and 11.4% with Gleam.

Women in BEAM survey results, Programming Language

Additionally, the survey included a question about other technologies, either as a hobby or as a secondary language. Most women working with Elixir as a primary technology indicated that they were experimenting with Erlang as an additional language and vice versa. This is not surprising, as if you work with Elixir and dig into the fundamentals, you must explore Erlang. On the other hand, if your primary programming language is Erlang, it can be pretty fun and easy to explore Elixir.

Women in BEAM survey results, BEAM programming language

Something else worth mentioning in this question was that there was a mention of LFE and EML. I was surprised because at least I don’t know both fundamentals, but it made me think about everything I still have to explore in BEAM and the alternative options. In some way, it also motivated me to investigate more about it, and that is precisely the meaning of the community: sharing knowledge.

As an extra, someone else mentioned that although it wasn’t a programming language per se, their favorite secondary technology was LiveView.If you, like me, are curious to explore everything that BEAM has to offer, you can find out more about it in the following list: Languages, and about languages, on the BEAM.

Diversity and Inclusion

I believe diversity and inclusion are strongly promoted in the BEAM community, setting it apart from other technologies. I was eager to hear other women’s perspectives, whether they share this view, and what actions we can take to improve further.

This section explores several related questions in depth, but the key takeaway is that most agree diversity and inclusion are actively encouraged in the community.

Of the total number of women surveyed, 82.9% consider that diversity and inclusion are promoted in the BEAM community, compared to 17.1% who think they are not.

Diversity and Inclusion.

Women who think no, indicated that this is because they know few or no other women in the company who work with any BEAM programming language and they do not know of any initiatives working on this topic, however, there is no reason beyond that, they have never had any gender issues and they like to attend community events.

On the other hand, women who believe that these topics are promoted shared that the main reason is thanks to the warmth of the people. For example, at events where they felt safe to share without fear of being judged, or when you contact one of the pioneers on social media and have support and even mentoring in some cases.

“From my experience at Code BEAM Europe, the BEAM community felt very welcoming. It seemed like a space where people could make mistakes, try new things, and learn together. That openness makes it easier for different perspectives to be part of the conversation.”

So far, so good, the general outlook is positive, but there is a tricky aspect to mention: 4 women reported having had gender problems in the community. This question was a one-way question and I did not go into the subject in depth so as not to make these women uncomfortable, but it is certainly an aspect that needs to be worked on.

Gender issues

This gives us a lead into the next section, the steps to follow.

Actionable Steps

The actions listed here aren’t solely focused on gender issues but aim to make the BEAM community more inclusive, based on suggestions from the women surveyed.

Gender Policies and Codes of Conduct

Many respondents highlighted the need for clear gender policies and better awareness of them. They support reinforcing codes of conduct at conferences, ensuring attendees know who to contact if issues arise.

One woman admired a company’s anti-harassment policy, and I agree—though few respondents reported problems, we must not minimise the issue. Strong community support makes addressing misconduct easier.

Spaces Dedicated to Women in BEAM

This was a recurring theme. Many women cited impostor syndrome as a barrier to participation and expressed interest in safe spaces to ask questions, practise talks, and seek advice.

“In my case, I don’t feel 100% comfortable in the environment but I am not sure how to promote greater participation. Maybe it will help if we create a small subgroup for women/nonbinary in the community to promote ourselves or to share projects and ideas.”

“Create women’s support groups. Where we can have learning sessions, mentors, talk about the working environment, talk about career levels to look forward to, give advice, etc.”

Support for beginners

Going back to the topic of the challenges faced by juniors, some of the suggestions are also to promote more content for those women who have little or no experience with BEAM and especially focus on the reasons why it is worth giving it a try.

Role Models

This is definitely my favourite measure. I have always been a supporter of promoting role models in technology to encourage more girls and teenagers to become interested in this, so I was delighted to know that this is a common opinion.

Many of the women surveyed pointed out that having a role model in the community can help with the goal of getting more women interested and participating.

“Highlighting the work of women already active in the community can make a difference. Seeing other women as speakers and leaders may encourage more to step forward.”

“I think the more visible women are in the community, the more women will participate.”

“Just seeing other women speak is an example to me. Seeing others who are relatable to me helps me realize I can just get up there and be me and speak on something I am interested in.”

These are just a few of the related responses.

Acknowledgements

 I would like to take this opportunity to mention the names of the people who came up in the survey, as many of the women mentioned that they do not have a female role model, but that along the way they have met men who support diversity and would like to acknowledge that.


Laura Castro, Elaine Naomi, “Tobias Pfeiffer who really advocates for diversity”, Robert Virding, Peer Stritzinger, Sigu MagwaSophie Benedetto, “Female role models are Ingela Andin from the OTP team, her history and dedication to working with the BEAM are great, and Hayleigh from the Gleam team, she is such a brilliant person”, “Some of my favourite folks I have seen speak, and who make me feel included in the community are: Meks McClure, Miki Rezentes, Jenny Bramble”, and to the women who mentioned me, thank you so much, I want to tell you that you made me smile a lot.

Women in BEAM Conclusion

I would like to thank all the women who took part in the survey, and to everyone who shared it on social media or with colleagues. Most of all, thank you to those who care about diversity and inclusion and work to make the BEAM community better every day.

I’ll be following up on all the comments and suggestions, and some women have even reached out to collaborate, which I’ll also pursue. Based on the responses, I’ve decided to make the survey an annual initiative. The details are still in the works, but I’ll keep you updated.

Lastly, thanks to all the role models in companies, schools, and the community, who inspire more women to discover how incredible Women in BEAM is.

See you in the next edition!

You can also watch Lorena’s webinar about Women in Elixir >>

The post Women in BEAM appeared first on Erlang Solutions.

by Lorena Mireles at February 06, 2025 14:43

February 01, 2025

Remko Tronçon

age-plugin-se: Building a lean cross-platform cryptography tool (FOSDEM'25 Swift Devroom)

In this lightning talk, I show age-plugin-se in action, and touch on the steps taken to make it robust, simple, and distributable on multiple platforms (including Alpine Linux), all while keeping the dependencies (including tools) to a minimum.

by Remko Tronçon at February 01, 2025 00:00

January 30, 2025

Erlang Solutions

5 Reasons to Build Scalable and Concurrent Applications with Elixir

Businesses can’t afford sluggish, unresponsive systems, especially when dealing with high volumes of concurrent requests. Slow applications lead to lost revenue, frustrated users, and missed opportunities. This is where Elixir comes in.

Purpose-built for scalability and concurrency, Elixir runs on the battle-tested Erlang Virtual Machine (BEAM), a technology trusted to power fault-tolerant, high-availability systems. 

Keep reading to discover 5 key reasons why Elixir scalable concurrent applications can help your business handle growth efficiently and maintain high performance under demand.

A bit of background on Elixir

Elixir was created in 2012 by Ruby developer Jose Valim. The Ruby programming language has long been considered the standard for developing enterprise apps because it is well-built and has a great framework. But Ruby was built at a time when we didn’t have the same system demands as we do now. Today, applications often run into issues with concurrency and scaling up applications. 

Valim wanted to enable higher extensibility and productivity for use in building large-scale sites and apps. For this, he turned to the older Erlang programming language. Erlang was built as a telecom solution with massive concurrency and the ability to handle millions of phone call connections. Building on top of Erlang and combining all the benefits of Ruby led to the high-concurrency, low-latency language we know today.

Please accept marketing-cookies to watch this video.

Now that you have some background let’s get straight into the five reasons Elixir stands out for building scalable and concurrent systems.

1) Elixir Excels in Scalability and Concurrency

Built on the Erlang Virtual Machine (BEAM), Elixir efficiently handles thousands, even millions, of simultaneous processes.

The Actor Model

Elixir’s concurrency model is based on the Actor model, which provides a message-passing system between processes.

Source: Lightbend

The “Actor Model” is for doing many things at the same time. It works by using actors as the basic building blocks. Think of them as little machines that can do things independently of each other and talk to each other by sending messages. Each of these little machines is called “processes”.

This way of working makes it easy to build systems that can handle multiple things at once, even when issues occur.

2) Fault Tolerance for Reliable Applications

Elixir’s supervisor mechanism enables applications to recover from failures automatically, ensuring uninterrupted service. Elixir’s processes are isolated from each other, which means that if a process fails, it does not affect the entire system. Developers can also use Elixir’s built-in error-handling mechanisms to handle errors gracefully.

Fault tolerance systems. Source: Finematics 

3. A Robust and Growing Ecosystem

Elixir has a large ecosystem of libraries and frameworks that can help developers build scalable and concurrent applications. One of the most popular frameworks is Phoenix. It provides features such as real-time communication, web sockets, and channels, which make it an ideal choice for building scalable and concurrent web applications. 

Elixir also has libraries such as GenServer, which provides a simple and powerful way to build concurrent applications.

Other ecosystems also include Mix, a build tool that automates many tasks in creating Elixir applications. Mix provides tasks for creating new projects, testing, and deploying applications. Mix is also extensible, allowing developers to create their tasks and plugins.

4. Developer-Friendly and Supported by a Thriving Community

A major draw to Elixir also lies in its simplicity. Its clean, easy-to-learn syntax allows developers to write efficient, high-performing code with minimal effort. Even those new to functional programming can quickly become proficient, increasing productivity. 

Elixir also boasts a passionate and growing community that regularly contributes new libraries, tools, and resources to keep the language modern and powerful. This strong community support makes it easier for newcomers to learn and for businesses to find skilled Elixir developers. 

5. Proven Success with Leading Companies

Major companies like Discord, Pinterest, Bleacher Report and Moz trust Elixir to handle their high-traffic operations. These real-world use cases highlight Elixir’s ability to scale and perform under heavy demand.

You can check out our case studies page to learn more about other great businesses that are using Elixir.

Conclusion

In a world where every second counts, sluggish systems just don’t cut it.

Elixir scalable concurrent applications provide the performance and reliability businesses need to thrive, even under heavy demand. With its rock-solid fault tolerance and vibrant community, Elixir is a game-changer for companies looking to scale and stay ahead.


If you’d like to learn more about Elixir, drop the team a line.

The post 5 Reasons to Build Scalable and Concurrent Applications with Elixir appeared first on Erlang Solutions.

by Erlang Solutions Team at January 30, 2025 11:27

January 23, 2025

Erlang Solutions

Understanding Digital Wallets

Digital wallets, once considered futuristic, have now become essential tools for both consumers and businesses. But what are digital wallets, and why should you care about them? Customer expectations are changing. Many companies are turning to them to streamline transactions and enhance the customer experience

This guide unpacks the fundamentals of digital wallets, highlighting their benefits, market trends, and implications for businesses.

What Are Digital Wallets?

Digital wallets (or e-wallets) have changed the way we make and receive payments. By 2025, digital payments are expected to account for 50% of global payments.

At their core, digital wallets store a user’s payment information, securely encrypted for seamless transactions. This could involve credit card details, bank accounts, or even cryptocurrencies.

Apple Pay, Google Wallet, PayPal, and Samsung Pay have become household names, but the ecosystem is much broader and growing rapidly as more industries recognise their potential. Digital wallets simplify purchases and integrate with loyalty programmes, personal finance management, and even identity verification, offering a comprehensive solution for consumers and businesses alike.

How Do Digital Wallets Work?

Digital wallets offer a secure and straightforward way to manage transactions. In a time when data breaches are increasingly common, security has never been more important. With cybercrime damages projected to reach $10.5 trillion annually in 2025, they play a major role in keeping financial information safe.

Here’s how they work. First, you link your financial details to the wallet. This could mean adding a credit card or connecting a bank account. Once your details are in, the wallet uses encryption and tokenisation to protect your sensitive information, converting it into a secure format that’s almost impossible for unauthorised parties to access.

When you make a payment, the process is quick and simple: tap, scan, or click. Behind the scenes, your digital wallet securely communicates with the payment processor to authorise the transaction. With advanced security measures like encryption and tokenisation, digital wallets not only reduce the risk of fraud but also allow for a seamless and reliable user experience.

Types of Digital Wallets

Now let’s explore the various types of digital wallets available:

1. Closed wallets

Amazon closed wallets example, Understanding Digital Wallets

2. Semi-closed wallets

Semi-closed wallets like Paytm or Venmo, allow payments at select merchant locations or online stores that accept their platform.

Venmo semi-closed wallets example, Understanding Digital Wallets

3. Open wallets

Backed by major financial institutions, open wallets allow broader transactions, including withdrawals, online purchases, and transfers. Popular examples include PayPal and Google Pay.

4. Prepaid Wallets

Prepaid wallets let you load funds in advance, so you use only what’s available. Once the balance is depleted, you just reload the wallet. This approach is great for budgeting.

Choosing the right digital wallet depends on your business model. 

Whether you’re looking for customer loyalty through closed wallets or broader international reach with open wallets, selecting the right type will drive better engagement and efficiency.

Why Should Businesses Care?

The rise of digital wallets represents a strategic opportunity for businesses to serve their customers better and improve their bottom line. Here’s why:

Enhanced customer experience

Digital wallets streamline the checkout process, reducing friction and improving customer satisfaction. Features like one-click payments and loyalty integrations can drive repeat business.

Improved security

Tokenisation and encryption reduce the risks associated with traditional payment methods. This not only protects users but also helps businesses build trust.

Cost efficiency

Payment processors for digital wallets often charge lower fees than those for traditional credit card transactions, which can run as high as 3%. Depending on the provider, digital wallets can significantly cut these costs.

Global reach

For companies aiming to expand internationally, digital wallets simplify cross-border transactions by supporting multiple currencies.

Digital wallets offer tangible benefits: enhanced customer experience, improved security, and cost efficiency. Businesses that integrate them can streamline payments and improve retention and satisfaction, driving growth.

Integrating Digital Wallets into Your Business

Before jumping into digital wallets, it’s worth taking a moment to plan things out. A bit of strategy can go a long way.

Here are some key things to keep in mind:

  • Know what your customers want: Look at your data or run a quick survey to find out which wallets your customers use most.
  • Pick the right payment processor: Go for a provider that supports lots of wallets. This gives you flexibility and makes it easier to grow.
  • Focus on security: Work with experts, like Erlang Solutions, to help build secure systems that keep data safe and meet the necessary guidelines around payments.
  • Test, optimise and refine: Start with a proof of concept to see how things work. We can help you get this done quickly so you can adjust and stay ahead of the game.

By understanding what your customers need and choosing flexible payment options, you can bring digital wallets into your business without any hiccups. Picking the right tech also means your operations keep running smoothly while you embrace innovations.

Challenges and Considerations

While digital wallets offer numerous benefits, they’re not without challenges:

  • Adoption barriers: Older demographics or tech-averse users may still prefer traditional payment methods. According to AARP, about 50% of older adults in the U.S. feel uncomfortable with new payment technologies. Businesses need strategies to educate and ease this transition.
  • Risk of fraud: While secure, digital wallets are not immune to hacking or phishing attacks. Companies must ensure continuous security updates and user education on best practices.
  • Regulatory compliance: Navigating the global landscape of payment regulations can be complex. From GDPR to PSP2, businesses must comply with relevant laws, especially when handling international transactions.

While digital wallets offer advantages, businesses must address adoption barriers, security concerns, and regulatory compliance. Preparing for these challenges allows for a smooth transition and mitigates potential risks.

Industries Using Digital Wallets

We’ve established how digital wallets are revolutionising the way we handle payments, making transactions faster, safer, and more convenient. There are some industries to highlight that are making the most of this technology.

Fintech

In the fintech world, digital wallets have become indispensable. For instance, Erlang Solutions collaborated with TeleWare to enhance their Re:Call app with secure instant messaging capabilities for a major UK financial services group. By integrating MongooseIM, they ensured compliance with strict regulatory requirements while improving user experience.

Teleware industries using Fintech wallets


E-commerce

Online shopping has been transformed by digital wallets. In 2021, a quarter of all UK transactions were made using digital wallets, and this trend is expected to grow by 18.9% through 2028. Features like biometric authentication not only make the checkout process quicker but also enhance security, leading to happier customers and increased loyalty.

Gaming

Gamers love convenience, and digital wallets deliver just that. 

By consolidating various payment methods, wallets like PayPal and Google Pay make in-game purchases seamless. This ease of use not only reduces transaction fees but also keeps players engaged, boosting customer retention.

Banking

Traditional banks are catching up by integrating digital wallets into their services. These wallets often combine payment processing with features like loyalty programmes and travel card integration. Advanced security measures, including biometric authentication, ensure that customers feel secure while enjoying personalised, cashless payment solutions.

The Future of Digital Wallets

The future of digital wallets lies in innovation.

Here are just some of the trends we are poised to see shape the landscape in the next few years: 

  • Integration with wearable tech: Smartwatches and fitness trackers will make payments even more convenient.
  • Biometric authentication: Consumers increasingly demand convenience without sacrificing security. Biometric features such as fingerprint recognition, voice ID, and facial scans will become commonplace, providing higher protection.
  • Cryptocurrency support: As digital currencies gain acceptance, more wallets are supporting crypto transactions. With over 300 million cryptocurrency users worldwide, businesses must be ready to accommodate this growing market.

You can explore even more key digital payment trends here.

Staying ahead of these trends will position your business as a forward-thinking leader in the digital economy.

To conclude

Digital wallets aren’t just another way to pay; they’re a game-changer for improving customer experience, boosting security, and driving growth. Nearly half the world’s consumers are already using them, and with transaction values expected to hit over $10 trillion by 2026, they’re becoming a must-have for businesses.

The big question for leaders isn’t whether to integrate them, but how to do it right. Now’s the perfect time to get started. By focusing on secure tech, understanding your customers, and keeping an eye on trends, you can unlock massive benefits. Erlang Solutions has the expertise to help you build digital wallet solutions that are secure and scalable. Ready to chat about your strategy? Drop us a message today.


The post Understanding Digital Wallets appeared first on Erlang Solutions.

by Erlang Solutions Team at January 23, 2025 11:27

January 16, 2025

Erlang Solutions

MongooseIM Round-Up

This is your one-stop shop for discovering everything Erlang Solutions offers in MongooseIM. From insightful blog posts to services and compelling case studies, this round-up shows how MongooseIM can evolve your messaging infrastructure.

If you’re looking to understand scalable messaging solutions or are keen to learn from real-world examples, read on to discover how MongooseIM can support your strategic goals.

MongooseIM Blogs

Our experts have crafted a series of blog posts to help you explore the full potential of MongooseIM. 

Whether you’re curious about its newest features, looking for strategies to optimise your messaging systems, or seeking ways to strike a balance between innovation and sustainability, there’s something for everyone in these insightful reads.

MongooseIM 6.3: Prometheus, CockroachDB, and More by Pawel Chrzaszcz

Discover the latest updates in MongooseIM 6.3, including integration with Prometheus for advanced monitoring and the robust scalability of CockroachDB. This blog looks deep into the enhancements that make MongooseIM a leader in real-time messaging. Learn how these features can support your business’s growth by ensuring reliable, future-proof infrastructure.

Learn more about these features and how they can support your business’s growth.

5 Ways MongooseIM Provides Scalable and Future-Proof Messaging

Why should your organisation choose MongooseIM? This blog outlines five compelling reasons. Explore how MongooseIM’s architecture is designed to meet the demands of growing user bases and evolving requirements, making it the ideal choice for forward-thinking businesses.

Discover more insights in this post.

Balancing Technical Debt and Innovation by Nelson Vides

Managing technical debt is a balancing act that every tech leader faces. This article offers actionable insights into how MongooseIM helps teams strike the right balance between maintaining existing systems and driving innovation. Learn from our experience working with leading organisations to make informed decisions about your technical strategy.

Check out the full article to learn from our experience working with leading organisations.

MongooseIM Services For Your Messaging Infrastructure

At the heart of MongooseIM lies a host of services designed to optimise, scale, and simplify your messaging infrastructure. Here are some of our services that are tailored to meet the needs of modern businesses and enhance system performance.

MongooseIM Healthcheck

Ensure your MongooseIM deployment is optimised for performance, scalability, and resilience. Our MIM Healthcheck service provides a thorough assessment, offering recommendations to improve system stability and enhance user experience. 

Explore MongooseIM Healthcheck in detail.

MongooseIM Autoscaler

MongooseIM Autoscaler helps your system adapt to traffic spikes with ease. Whether your user base grows gradually or you face sudden surges, our Autoscaler ensures seamless performance, reducing downtime and costs. 

Learn more about how Autoscaler keeps your infrastructure reliable and cost-efficient.

tryMongooseIM

Curious about MongooseIM but not sure where to start? tryMongooseIM offers a hands-on introduction to the platform, allowing you to test its features and evaluate its potential for your business before committing. 

Find out how to get started with tryMongooseIM today.

MongooseIM Case Studies: Success in Action

Real-world success stories speak volumes about MongooseIM’s impact. Discover how leading organisations have leveraged MongooseIM to transform their messaging systems, achieving scalability, reliability, and innovation in competitive industries.

Pando

Pando, a leading healthcare supply chain solutions provider, turned to MongooseIM to build a robust messaging platform that could handle real-time communication at scale. 

Read the full case study to learn how our collaboration transformed their operations with a secure and scalable solution.

Beekeeper

Beekeeper’s workforce communication platform needed a messaging backbone supporting diverse global industries. With MongooseIM, they achieved the scalability, security, and reliability their customers demanded. 

Discover their success story and see how MongooseIM helped Beekeeper thrive.

If you need more

We hope this guide provided you valuable insights into the power of MongooseIM. If you’d like to discuss how MongooseIM can elevate your messaging infrastructure, don’t hesitate to get in touch.

Contact us today and start your journey toward scalable, future-proof messaging solutions.

The post MongooseIM Round-Up appeared first on Erlang Solutions.

by Erlang Solutions Team at January 16, 2025 16:17