Bulletin for Friday, 04 Mar 2022
7 days digest
allegro.tech (1)
Almost Secure (1)
Blog - Bitfield Consulting (1)
Computer Things (1)
Future (1)
General Engineering Archives - Uber Engineering Blog (1)
Graham King (1)
Riot Games Tech Blog News Feed (1)
Sentry Blog RSS (1)
Think Fast, Talk Smart: Communication Techniques (1)
- The next big connectivity challenge: Building metaverse-ready networks
- Meta’s subsea cable investments expected to contribute over half a trillion dollars to Asia-Pacific and European economies by 2025
Mozilla Hacks – the Web developer blog (2)
- Introducing NerdOut@Spotify: A New Podcast for Developers
- Search Journey Towards Better Experimentation Practices
Timescale Blog (2)
Tom Gamon (2)
Weaveworks (2)
- ADAPT AND THRIVE: Digital Transformation for Business Success
- The world’s largest telcos are now embracing GitOps. Deutsche Telekom explains why
- Conti Ransomware Group Diaries, Part II: The Office
- Conti Ransomware Group Diaries, Part I: Evasion
- Russia Sanctions May Spark Escalating Cyber Conflict
- iCloud Private Relay: information for Cloudflare customers
- The post-quantum future: challenges and opportunities
- Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
- A Message to Russia: We Will Not Support Your War in Ukraine
- What is Kubectl?
- How To Use SSH ProxyJump and SSH ProxyCommand
- Universally unique identifier? Sometimes...
- When Command-V (or CTRL-V) is your "copilot"
- C++ header files and inter-class connections
- Using natural language processing to understand and identify risks
- Amazon VP Babak Parviz appointed to AAAS Board of Directors
- How Haluk Demirkan is using machine learning to get devices to the right place at the right time
- Improving question-answering models that use data from tables
Pluralistic: Daily links from Cory Doctorow (4)
The Full Feed - All of the Packet Pushers Podcasts (4)
- Day Two Cloud 136: The Role And Responsibilities Of A Kubernetes Operator (Sponsored)
- Tech Bytes: How Fortinet’s FortiGuard Labs Turns Billions Of Security Events Into Intelligence (Sponsored)
- Network Break 371: Arista Turns Campus Switch Into NDR Sensor; Mikrotik Puts A Router On A PCIe Card
- Heavy Networking 619: Pluribus Empowers NetOps With Kubernetes Network Visibility (Sponsored)
- Why immutable databases? (Go Time #219)
- Securing the open source supply chain (The Changelog #482)
- Deploying models (to tractors 🚜) (Practical AI #169)
- Making the command line glamorous (The Changelog #481)
- Vitest && Slidev (JS Party #214)
Google AI Blog (5)
- TRILLsson: Small, Universal Speech Representations for Paralinguistic Tasks
- Using Deep Learning to Annotate the Protein Universe
- Co-training Transformer with Videos and Images Improves Action Recognition
- Federated Learning with Formal Differential Privacy Guarantees
- Constrained Reweighting for Training Deep Neural Nets with Noisy Labels
The CircleCI Blog Feed - CircleCI (6)
- Troubleshooting CircleCI webhooks
- You don’t need to migrate from Jenkins. Start building beside it.
- Automating database cleanup with scheduled pipelines
- Technical debt: how to measure and manage it with DevOps
- How to reduce flaky test failures
- Advanced pipeline orchestration with the circleback pattern
- Stop aggregating away the signal in your data
- What’s new in Content Health?
- Twilio launches Collective on Stack Overflow
- The Great QR Code Comeback (Ep. 419)
- Debugging best practices for REST API consumers
- The Overflow #114: Work estimates that account for friction, continual learning, and the coders inspired by Tumblr
- Is functional programming the hipster programming paradigm? (Ep. 418)
Cloud Blog (16)
- Four Ways States Use Digital Tools to Deliver Critical Services
- Launching new feature or games on existing Cloud Spanner database with Load Generator Tool
- 78% of VM migrations realize payback in one year or less
- Redesigning the Cloud SDK + CLI for easier development
- Build your perfect Google Cloud infrastructure using Terraform and the gcloud CLI
- How Google Cloud helps you to architect for DR when you have locality restricted workloads
- How Mux meets rising video demands by focusing on developers
- Google Cloud’s security and resiliency measures for customers and partners
- Customizing time ranges for budgets in the console
- Extending network reachability of Vertex AI Pipelines
- Google Cloud and Dell PowerScale transform semiconductor design models
- Google Cloud Managed Service for Prometheus is now generally available
- Using VACUUM to accelerate transaction ID freezing in Cloud SQL for PostgreSQL
- A chiplet innovation ecosystem for a new era of custom silicon
- Shaping the future of work for frontline workers in Asia Pacific
- Congratulations Knative on becoming part of the CNCF
The attack on Ukraine has shocked the entire world, but in Poland it is making especially big waves. Not just due to geographical proximity - Ukrainians are one of the largest minorities in Poland and simply put it is affecting people we know personally. While the fighting continues, here’s what Allegro is doing, and what you can do, too, to help humanitarian efforts. If you know any Ukrainians, your coworkers in particular, talk to them and show your support. Even minor gestures are important. (BACK TO TOP)
One of the most popular Chrome extensions is Skype, a browser extension designed as a helper for the Skype application. Back when I reported the issues discussed here it was listed in Chrome Web Store with more than 10 million users, at the time of writing more than 9 million users still remain. What these users apparently didn’t realize: the extension was unmaintained, with the latest release being more than four years old. Hopefully this one will no longer be abandoned.com, outlook.cid.google. (BACK TO TOP)
https://bitfieldconsulting.com/blog/
Modern infrastructure generates a heck of a lot of data, and it all has to go somewhere. Here’s how to connect your Checkly data to Prometheus and Grafana, as part of an integrated observability pipeline. (BACK TO TOP)
https://buttondown.email/hillelwayne
Last week I read Software I’m Thankful For and it inspired me to do a similar piece. I use a lot of different exotic tools, too, so I think it’s a good way to share some stuff most people haven’t seen. At least mainstream programmers, if you’ve been following me for a while a lot of this will be familiar. TLA+ and Alloy So let’s start with the big, obvious ones. TLA+ and Alloy are both formal methods languages for finding problems in designs.) TLA+ in particular changed the arc of my career..... (BACK TO TOP)
The artificial intelligence field has evolved dramatically since the deep learning revolution kicked off in 2012, and Richard Socher has been around for all of it. He earned his PhD from Stanford working on NLP (natural language processing) before co-founding an AI startup called MetaMind in 2013. He then spent several years leading the AI... Read More The post A Decade of Deep Learning: How the AI Startup Experience Has Evolved appeared first on Future . (BACK TO TOP)
As Uber’s architecture has grown to encompass thousands of interdependent microservices, we need to test our mission-critical components at max load in order to preserve reliability. Accurate load testing allows us to validate if a set of services are working … The post Introducing Ballast: An Adaptive Load Test Framework appeared first on Uber Engineering Blog . (BACK TO TOP)
/
Rust avoids memory copies by optimizing return value placement. (BACK TO TOP)
See this post’s code on Github . My mother works with a food pantry and recently they have an interesting logistical challenge: they get nearly free meat donated from another non-profit, but can only order it after the other non-profit updates their website and need to order it somewhat immediately (within a few hours) of the website’s updates. Specifically I’ll be crawling infraeng.dev . My first step was creating a new repository on Github. Which left me with a brand new, empty, repository.ca. (BACK TO TOP)
Fixing retries with token buckets and circuit breakers Throttle yourself before you DoS yourself. After my last post on circuit breakers , a couple of people reached out to recommend using circuit breakers only to break retries, and still send normal first try traffic no matter the failure rate. That's a nice approach. To see how well that works, we can compare it to my favorite better retries approach: a token bucket. First, let's formally introduce the players: No retries . N retries . (BACK TO TOP)
https://www.tbray.org/ongoing/ongoing.atom
https://technology.riotgames.com/
In this article, I’ll cover how we took Renata Glasc's ultimate from a hacky prototype to a game-changing spell, cleaning up some legacy code and systems along the way. (BACK TO TOP)
SDKs naturally increase in size over time. After all, it does take more bytes to implement more features. This is not a big deal for most… (BACK TO TOP)
https://www.hackerfactor.com/blog/
Historically, February has been unpredictable at FotoForensics . Having fewer days than any other month should mean that it receives fewer pictures. However, that's rarely the case. Often, February receives more pictures than January. February 2022 just closed as the 6th busiest month so far. (FotoForensics has been around for 120 months.) There were two unrelated things that really caused February to be busy: Chinese screenshots and war in Ukraine. (That's 27 out of 30 pictures... he's right. (BACK TO TOP)
https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast
“You’re not going to hit the mark with everybody, but you still need to be mindful of everybody,” says Jonathan Levav , the King Philanthropies Professor of Marketing. “That’s critical to create an environment where communication is effective.” In this podcast episode, Levav sits down with podcast host Matt Abrahams to talk about the science behind decision fatigue, how to lead effectively while working from home, and how to create the right company culture both in the office and online. (BACK TO TOP)
Statement from our Chief Scientist and Co-Founder, Paddy Byers, regarding the steps we are taking to respond to the events in Ukraine. (BACK TO TOP)
Build reliable, scalable peer-to-peer networks with leader election strategies powered by Ably. (BACK TO TOP)
The move to the metaverse is an unprecedented opportunity for the connectivity industry. It must be built on a foundation of openness and interoperability, and be accessible to as many people as possible. Making the metaverse a reality will require significant advancements in network latency, symmetrical bandwidth and overall speed of networks. No single company, […] The post The next big connectivity challenge: Building metaverse-ready networks appeared first on Facebook Technology . (BACK TO TOP)
Meta’s subsea cable investments expected to contribute over half a trillion dollars to Asia-Pacific and European economies by 2025
Our investments in subsea fiber-optic cables expand broadband capacity for people and businesses in developed and emerging markets around the world. We’ve helped develop two subsea cables in the Asia-Pacific (APAC) region that are already in service, and we are building and developing several more across the region. (BACK TO TOP)
https://engineering.linkedin.com/blog.rss.html
Co-authors: Rupesh Gupta, Sasha Ovsankin, Qing Li, Seunghyun Lee, Benjamin Le, and Sunil Khanal At LinkedIn, we strive to serve the most relevant recommendations to our members, whether that’s a job they may be interested in, a member they may want to connect with, or another type of suggestion. In order to do that, we need to know their intent and preferences, which may be revealed through their actions on our application. (BACK TO TOP)
Co-authors: Dhruv Bansal, Aanchal Somani, Sneha Dewan, and Vikrant Mahajan At LinkedIn, transparency is important to us, including transparency around members’ ad settings and targeting. We’ve provided information about this through Help Center articles, but after hearing from members, we discovered that there was a more effective, in-product experience we could provide on the platform. (BACK TO TOP)
Writing high quality standards is a necessary first step to an interoperable web platform, but ensuring that browsers are consistent in their behavior requires an ongoing process. Browsers must work to ensure that they have a shared understanding of web standards, and that their implementation matches that understanding. Interop 2022 is a cross-browser initiative to find and address the most important interoperability pain points on the web platform. (BACK TO TOP)
If you’ve accessed the MDN website today, you probably noticed that it looks quite different. We hope it’s a good different. Let us explain! In mid-2021 we started to think about modernizing MDN’s design, to create a clean and inviting website that makes navigating our 44,000 articles as easy as possible. We wanted to create a more holistic experience for our users, with an emphasis on improved navigability and a universal look and feel across all our pages. (BACK TO TOP)
https://engineering.atspotify.com
TL;DR For years, Spotify’s official engineering blog has been giving you a peek behind the curtain at Spotify R&D. Today, we’re announcing NerdOut@Spotify, our new R&D podcast that gives you another view into our tech world. In each episode I’ll talk with Spotify developers about challenging tech problems and give you a firsthand look into [...] (BACK TO TOP)
At Spotify, we aim to build and improve our product in a data-informed way. To do that, teams are encouraged to generate and test hypotheses by running experiments and gathering evidence for what works and what doesn’t. In the Search team, in our journey towards this goal, we have learned that, besides having the ambition, [...] (BACK TO TOP)
https://blog.pragmaticengineer.com/
Amazon has a large number of internal systems. Here are ones worth knowing about as a software engineer and engineering manager. This is a content summary only. Click on the blog title to continue reading this post and browse The Pragmatic Engineer blog. (BACK TO TOP)
What impact will the war have on the European tech scene, on international companies and will we see "tech migrations" from Ukraine and Russia? This is a content summary only. Click on the blog title to continue reading this post and browse The Pragmatic Engineer blog. (BACK TO TOP)
https://www.timescale.com/blog/
Our friends from CloudQuery join us to share how they've set up their data stack to extract, transform, and load cloud assets data into normalized PostgreSQL tables. (BACK TO TOP)
Are you building TimescaleDB in Docker? This blog post walks you through everything you need to know, including step-by-step instructions and best practices. (BACK TO TOP)
The other day I was cooking something in the oven. It was browning too quickly on top so I was juggling it between shelves and covering it with foil. My partner came in and said “Why don’t you turn the oven down?” I was treating something that is variable as invariable. There is an infamous project within my team where we were running behind and tensions were high. We had a particularly fractious meeting and my manager at the time stepped in. Recently I was helping some engineers in the team. (BACK TO TOP)
There are many ways to cook a cow 1 . You could cook the thing whole, but some parts would be done way before others, and your customers would be waiting a long time before they can take a single bite. You could slice the whole thing across in great big slices. Although it would now be quicker to cook, and would make one hell of a steak, you would still end up with some parts overdone while other parts are inedibly raw. French butchers distinguish between 26 different cuts of beef 2 . (BACK TO TOP)
1: How to innovate faster It is now possible to update your apps and websites quicker, without increasing risk. Here’s how. Whatever business you’re in, your ability to develop applications is a critical success factor. You might need applications to integrate with suppliers, partners and customers. You might need mobile apps that your employees or, often, customers need to use. Software is everywhere nowadays. But making that software has always been hard. In other words, speed matters... (BACK TO TOP)
GitOps and 5G - a deep dive into Deutsche Telekom’s experience As telecom providers around the world get to grips with the rollout of 5G, the industry is facing a radical change in the way that it delivers software. With more and more network functions shifting from hardware to software, containers – and specifically containers managed by Kubernetes – are emerging as the most appropriate way of delivering software in this new super-complex, cloud native new world. (BACK TO TOP)
Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal breaches and attacks from private security firms and governments. In Part II of this series we’ll explore what it’s like to work for Conti, as described by the Conti employees themselves. (BACK TO TOP)
A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million in annual revenue. The chat logs offer a fascinating glimpse into the challenges of running a sprawling criminal enterprise with more than 100 salaried employees. (BACK TO TOP)
President Biden joined European leaders this week in enacting economic sanctions against Russia in response its military invasion of Ukraine. The West has promised tougher sanctions are coming, but experts warn these will almost certainly trigger a Russian retaliation against America and its allies, which could escalate into cyber attacks on Western financial institutions and energy infrastructure. (BACK TO TOP)
iCloud Private Relay is a new Internet privacy service from Apple that allows users to connect to the Internet and browse with Safari in a more secure and private way. Cloudflare is proud to work with Apple to operate portions of Private Relay infrastructure (BACK TO TOP)
The story and path of post-quantum cryptography is clear. But, what are the future challenges? In this blog post, we explore them (BACK TO TOP)
A big challenge is coming: to change all internal connections at Cloudflare to use post-quantum cryptography. Read how we are tackling this challenge! (BACK TO TOP)
Effective immediately, Teleport will cease doing business with all organizations headquartered in Russia. We are starting conversations with affected current customers and are winding down our involvement as quickly as is legally possible. With this action, we want to send a clear message to the Russian government: we condemn the invasion of Ukraine, and we will not enable your aggression through direct or indirect use of our technology. At Teleport, we are builders. (BACK TO TOP)
What is kubectl? In the last few years, Kubernetes has grown exponentially in popularity. Its wide adoption can be attributed to its open source nature, flexibility, and ability to run anywhere. Developers also love the fact that you can manage everything in Kubernetes using code. kubectl is the Kubernetes-specific command line tool that lets you communicate and control Kubernetes clusters. In this article, you’ll learn about kubectl, why it’s needed, what it can do, and how it works.e.e. (BACK TO TOP)
OpenSSH ProxyJump and ProxyCommand directives tell the SSH client how to connect to a remote server via an intermediary server — often called a jump host, jump server, or bastion server. If you are new to jump servers, read our tutorial on how to set up a jump server and learn some of the best practices to secure them . ProxyCommand vs. But ProxyJump is available only since OpenSSH version 7.5, and the feature requires port forwarding to be supported by intermediate hosts.ssh/config ).168.200. (BACK TO TOP)
This is a short one since it's somewhere between a random bit of "grab some popcorn" amusement and a "huh, that might be a problem some day". In short, it looks like every Raspberry Pi filesystem installed from any given release image probably ends up with the same UUID . When is a universally unique identifier not universally unique? When it gets stamped into a filesystem that is then cloned onto a bunch of storage devices and used as-is.zip....." value will break when you do that... (BACK TO TOP)
A reader wrote in asking what I thought about the whole GitHub "copilot" thing. If you haven't heard of it yet, it's apparently this thing that was trained on a whole mess of repositories and their code, and you can "prompt" it and it'll spit out code that may or may not do what you want. It doesn't seem to know about licensing (BSD, GPL, MIT, that sort of thing), or plagiarism, or any of that other good stuff. Now, maybe it's just the caffeine talking, but I feel like going for it. It wasn't... (BACK TO TOP)
There are some interesting implications to the way that you have to handle references to other bits of code when you write a C++ header file. There are things you can do which turn out to be suboptimal, and until or unless you work someplace with a coding style document or get some mentor who's already been there, you're likely to make some mistakes. There's this thing we tend to do when we need a class to own an instance of another class. That is, you don't want this (in your foo.h in your foo. (BACK TO TOP)
As an applied science manager at Amazon, Muthu Chandrasekaran works on new tools to automate and build a risk technology. (BACK TO TOP)
Parviz will serve a three-year term as one of four appointed directors. (BACK TO TOP)
Part-time sabbatical plan turns into full-time role for author of five books and more than 170 research articles. (BACK TO TOP)
Novel pretraining method enables increases of 5% to 14% on five different evaluation metrics. (BACK TO TOP)
Today's links Defi and Shadow Banking 2.0: Leverage, rigidity and bank runs. This day in history: 2002, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Defi and Shadow Banking 2.0 (permalink) 14 year ago, the world's financial system came to the brink of collapse. Central banks scrambled to react. Businesses shuttered. People lost their homes. Many governments fell. Faith in our institutions shattered. So was Bitcoin. II. III.0.0. (BACK TO TOP)
Today's links How "hollowed" hotels are destroying worker rights: REITs aren't just for money laundering. Hey look at this: Delights to delectate. This day in history: 2002, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading How "hollowed" hotels are destroying worker rights (permalink) The Real Estate Investment Trust is (REIT) a sixties-era tax shelter designed to allow mom-and-pop investors to buy into income properties.forbes.ava. (BACK TO TOP)
Today's links Podcasting "We Should Not Endure a King": Antitrust is a leftist cause. https://marker.medium.com/we-should-not-endure-a-king-dfef34628153 It's a perfectly reasonable fear. For the past four decades, the entire antitrust discourse has been about economics – about when a company's anticompetitive conduct is "inefficient," based on some complex mathematical formula. But that's not how antitrust works, it's how it was made to fail. Antitrust has its origins in politics, not economics. (BACK TO TOP)
Today's links Amazon's $31b "ad business" isn't: They getcha coming and going. This day in history: 2002, 2012, 2017, 2021. Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Amazon's $31b "ad business" isn't (permalink) Looking at Amazon's quarterly financials, it would be easy to mistake the company's $31b ad division as a serious shift in the online advertising industry, but that would be a huge mistake." https://www.marketplacepulse.cs.umd. (BACK TO TOP)
Today on the Day Two Cloud podcast we examine the role and responsibilities of Kubernetes operators; that is, the humans in charge of running Kubernetes. Kubernetes operators have to support application and security teams, handle capacity planning, keep an eye on versioning, and more. This episode is sponsored by F5's NGINX team. Our guests are Jenn Gile, Sr Manager of Product Marketing; and Brian Ehlert, Sr Product Manager. (BACK TO TOP)
Tech Bytes: How Fortinet’s FortiGuard Labs Turns Billions Of Security Events Into Intelligence (Sponsored)
Today’s Tech Bytes podcast explores threat intelligence with sponsor Fortinet and its FortiGuard Labs. FortiGuard Labs analyzes billions of global security events daily and distills them into actionable information for network and security teams. Fortinet also uses those events to inform security updates to its products. The post Tech Bytes: How Fortinet’s FortiGuard Labs Turns Billions Of Security Events Into Intelligence (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)
Network Break 371: Arista Turns Campus Switch Into NDR Sensor; Mikrotik Puts A Router On A PCIe Card
Take a Network Break! This week we examine how Arista is turning a campus switch into a sensor for network detection and response, a new PCIe card from Mikrotik running router software, a Dell/Marvell partnership on hardware for Open RAN gear, Cisco and Dell financial results, potential equipment danger from solar flares, and more. The post Network Break 371: Arista Turns Campus Switch Into NDR Sensor; Mikrotik Puts A Router On A PCIe Card appeared first on Packet Pushers . (BACK TO TOP)
Today's sponsored Heavy Networking dives into the latest features from Pluribus Networks, including Pluribus KubeTracker, which correlates containers with applications, maps hosts to the network fabric, and more. We also cover FlowTracker and a virtualized packet broker service. Our guest is Alessandro Barbieri, VP Product Management at Pluribus. The post Heavy Networking 619: Pluribus Empowers NetOps With Kubernetes Network Visibility (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)
Let’s talk about the concept of immutable databases, the problems they target, and why you’d want to build one in Go. (BACK TO TOP)
This week we’re joined by the “mad scientist” himself, Feross Aboukhadijeh…and we’re talking about the launch of Socket — the next big thing in the fight to secure and protect the open source supply chain. While working on the frontlines of open source, Feross and team have witnessed firsthand how supply chain attacks have swept across the software community and have damaged the trust in open source. We cover the whys, the hows, and what’s next for this ambitious and very much needed project. (BACK TO TOP)
Alon from Greeneye and Moses from ClearML blew us away when they said that they are training 1000’s of models a year that get deployed to Kubernetes clusters on tractors. Yes… we said tractors, as in farming! This is a super cool discussion about MLOps solutions at scale for interesting use cases in agriculture. (BACK TO TOP)
This week we’re talking to Toby Padilla, Co-Founder at Charm — where they build tools to make the command line glamorous. We talk about the state of the art, the next big thing happening on the command line and in ssh-land. They have an array of open source tooling to build great apps for the terminal and Charm Cloud to power a new generation of CLI apps. (BACK TO TOP)
Anthony Fu && Matias “Patak” Capeletto from the Vite core team join Jerod && Nick to discuss Vitest – a blazing fast unit-test framework powered by Vite, && Slidev – presentation slides for developers. (BACK TO TOP)
Posted by Joel Shor, Staff Software Engineer, Google Research In recent years, we have seen dramatic improvements on lexical tasks such as automatic speech recognition (ASR). However, machine systems still struggle to understand paralinguistic aspects — such as tone, emotion, whether a speaker is wearing a mask, etc. Understanding these aspects represents one of the remaining difficult problems in machine hearing .g., vision and speech, or text and speech) as well.4 97.9 5.11 45.9 74.0 ∗ 67.0 6. (BACK TO TOP)
Posted by Maxwell Bileschi, Staff Software Engineer and Lucy Colwell, Research Scientist, Google Research, Brain Team Proteins are essential molecules found in all living things. They play a central role in our bodies’ structure and function, and they are also featured in many products that we encounter every day, from medications to household items like laundry detergent. An example of a protein with known structure, TrpCF from E.g., the globin and trypsin families. (BACK TO TOP)
Posted by Bowen Zhang, Student Researcher and Jiahui Yu, Senior Research Scientist, Google Research, Brain Team Action recognition has become a major focus area for the research community because many applications can benefit from improved modeling, such as video retrieval , video captioning , video question-answering , etc. Transformer -based approaches have recently demonstrated state-of-the-art performance on several benchmarks . Our approach is buttressed by two main findings.4%.8%, and 1. (BACK TO TOP)
Posted by Brendan McMahan and Abhradeep Thakurta, Research Scientists, Google Research In 2017, Google introduced federated learning (FL), an approach that enables mobile devices to collaboratively train machine learning (ML) models while keeping the raw training data on each user's device, decoupling the ability to do ML from the need to store the data in the cloud.81 zero-Concentrated-Differential-Privacy , zCDP, discussed in detail below).g., phone numbers, addresses, credit card numbers.g. (BACK TO TOP)
Posted by Abhishek Kumar and Ehsan Amid, Research Scientists, Google Research, Brain Team Over the past several years, deep neural networks (DNNs) have been quite successful in driving impressive performance gains in several real-world applications, from image recognition to genomics . However, modern DNNs often have far more trainable model parameters than the number of training examples and the resulting overparameterized networks can easily overfit to noisy or corrupted labels (i.e.g.e.e.8. (BACK TO TOP)
This tutorial covers: Setting up CircleCI webhooks Tunneling HTTP requests with Hookdeck CLI Troubleshooting common errors CircleCI webhooks open up a variety of exciting use cases, from data logging and integrations with third-party monitoring and observability solutions to setting up your own custom dashboards to monitor pipeline health. Prerequisites To begin, there are a few things you need to have or set up, including: A CircleCI account and associated project Node.js API.e.e...hookdeck. (BACK TO TOP)
Ten years ago, tools like Jenkins were first-class automation platforms for your CI pipelines . The jump from lower-level tools and custom scripts to tools like Jenkins created dramatic improvements. Now, a new generation of web-based tools are available. They provide a platform for the next leap forward for product build automation. This long history means that many mature organizations use Jenkins for CI. There is an alternative.image('node:14-alpine'). Errors can cause operation disruptions. (BACK TO TOP)
This tutorial covers: Cloning a sample application Creating and configuring a scheduled pipeline Running the scheduled pipeline RESTful API projects often require that developers grant temporary access to a particular resource. Sometimes this happens within a specific interval, such as a few days or months. Revoking permissions when they expire could mean including extra logic during the authentication process or writing a middleware function to attach to the secured endpoint.env.env.sample .0. (BACK TO TOP)
Every technical team in the software industry is familiar with technical debt. That is because every software team incurs technical debt along the way. This article answers some critical questions about technical debt. It reviews what technical debt is and what its causes are, why it is essential to address technical debt, and how this debt accumulates. In doing so, this team is incurring a technical “debt.” The larger the project is, the more technical debt the team takes on. (BACK TO TOP)
Testing helps you discover bugs before you release software, enabling you to deliver a high-quality product to your customers. Sometimes, though, tests are flaky and unreliable. What is a flaky test? Flaky tests, also known as flappers, fail to produce accurate and consistent results. These tests may be unreliable because of newly-written code or as a result of external factors. If your tests are flaky, they cannot help you find (and fix) all your bugs, which negatively impacts user experience. (BACK TO TOP)
This tutorial covers: Orchestrating triggers for a dependent pipeline Intro to the circleback pattern Creating the config for a circleback pipeline With multiple teams working on many projects, having a single pipeline for your software is just not enough. These projects need to be built and integrated before they can be tested and released. This approach has resulted in the microservices architectures that are increasingly common in our industry. CI/CD pipelines are not an exception here....... (BACK TO TOP)
By aggregating our data in an effort to simplify it, we lose the signal and the context we need to make sense of what we’re seeing. The post Stop aggregating away the signal in your data appeared first on Stack Overflow Blog . (BACK TO TOP)
Our Content Health feature helps intelligently identify and surface potentially outdated or inaccurate knowledge—content that needs to be reviewed in order to keep your knowledge base healthy. The post What’s new in Content Health? appeared first on Stack Overflow Blog . (BACK TO TOP)
More than 10 million developers use Twilio’s platform to add customer engagement solutions to their products and services. Now there’s an easy way to find helpful content and connect with experts from Twilio and the Stack Overflow community when you have questions. The post Twilio launches Collective on Stack Overflow appeared first on Stack Overflow Blog . (BACK TO TOP)
The home team talks about award-winning diagramming and charting tool Mermaid, the QR code ad promoting crypto at the Super Bowl, and Intel’s semiconductor investment. The post The Great QR Code Comeback (Ep. 419) appeared first on Stack Overflow Blog . (BACK TO TOP)
How you can debug the APIs that you consume but don't own. The post Debugging best practices for REST API consumers appeared first on Stack Overflow Blog . (BACK TO TOP)
The Overflow #114: Work estimates that account for friction, continual learning, and the coders inspired by Tumblr
Welcome to ISSUE #114 of The Overflow! This newsletter is by developers, for developers, written and curated by the Stack Overflow team and Cassidy Williams. This week: realistic work estimates, creating a culture of continual learning, and how Tumblr inspired a generation of women to code. The post The Overflow #114: Work estimates that account for friction, continual learning, and the coders inspired by Tumblr appeared first on Stack Overflow Blog . (BACK TO TOP)
Cassidy, Ceora, and Matt discuss functional programming and where it got its reputation as “the mustachioed hipster of programming paradigms.” Cassidy used to run a workshop teaching functional programming with JavaScript and currently works with Elixir, “a fully functional programming backend.” The post Is functional programming the hipster programming paradigm? (Ep. 418) appeared first on Stack Overflow Blog . (BACK TO TOP)
https://cloud.google.com/blog/
Government leaders are reimagining the way they serve communities in the new digital era. They’ve traded manual, paper-based processes and in-person services for digitized, flexible solutions that offer better constituent experiences and improve operations. Google Cloud is working with SpringML to help public sector agencies address four pandemic-driven challenges with digital solutions. Unlike paper, digital immunization credentials are easy to access and difficult to forge. (BACK TO TOP)
Game developers often reuse their existing database platform to launch their new games or launch new features to their existing games. This requires the database to scale in terms of new schema (tables, index, etc.), data and traffic. For games built with Cloud Spanner databases, most database operations can be done seamlessly, without affecting production game traffic. Cloud Spanner allows you to make schema updates with no downtime.e. Track and Delete Synthetic Data 1. 4. 5. 6... Read Article (BACK TO TOP)
Enterprises are interested in moving to the cloud to increase agility in a world where everyone is remote while simultaneously reducing the burden of operating costs. The service provides a dedicated software defined data center (SDDC) that allows you to continue to use the core VMware applications you need to run your business in the cloud, without changes to your tools, processes or policies. Before starting your move, it can be helpful to seek advice from an experienced expert. (Doc.. (BACK TO TOP)
At Google Cloud we are constantly iterating on our tools to improve the developer experience and make it easier for you to interact with our technologies. To this end, we are pleased to announce the rebranded Google Cloud SDK . It continues to contain the same gcloud , gsutil , bq , kubectl , and various data emulators and other tools for local development. All existing scripts will continue to work since there are no command prompt related changes.google.js moves support for Node. Read Article (BACK TO TOP)
Infrastructure-as-Code (Iac) tools like Terraform are experiencing fast growing adoption by the developer community. This is no surprise because they greatly simplify the operational overhead associated with deploying and managing cloud infrastructure. In support of this growing trend, today we are pleased to announce Google Cloud CLI’s preview release of Declarative Export for Terraform. Here’s how it works and why this is useful to your day-to-day cloud development workflows... Read Article (BACK TO TOP)
There are many reasons why locality restrictions need to be taken into consideration and it's something CISOs and resiliency officers need to factor in. A balance needs to be met between taking advantage of the best features of the cloud while meeting your locality requirements. Google Cloud helps you meet your business objectives; whether your architecture is all-in on Google Cloud, a hybrid pattern which may be on-premises and Google Cloud, or on Google Cloud and an alternative cloud provider. (BACK TO TOP)
As the variety of content creators, devices, and platforms has grown exponentially in recent years, video has become arguably the dominant online medium, accounting for a majority of today’s IP traffic. “Humans sleep first, work second, watch video third, and then everything else is like category four,” said Jon Dahl, co-founder and CEO of Mux , a video infrastructure platform built on Google Cloud. “Video is just a high-bandwidth way of communicating something. Read Article (BACK TO TOP)
As the tragic Russian invasion of Ukraine continues, we want to provide customers and partners with an update on how Google Cloud is providing resources for organizations, protecting against potential cyberattacks, and delivering network resiliency. We continue to work closely with U.S. and international officials in our approach—and have undertaken several steps across Google to bolster humanitarian efforts in the region, counter disinformation, and protect local Ukrainian citizens. (BACK TO TOP)
TL;DR: You can now use the Google Cloud Console to customize the time ranges of your budgets! Technically you're saving money because the month is shorter, right? Good news everyone! If you manage your budgets through the Google Cloud Console, you can now choose custom time ranges for your budgets. Those of you dedicated readers who have been following the billing blogs may have seen the previous posts about using the Budget API as well as using the API to customize the budget period ... (BACK TO TOP)
Vertex AI Pipelines and jobs use the Service Networking API to configure their networking. As such, they will run in a Google-owned VPC network in tenant project that is peered to the network in your project. This peering is subject to the following standard VPC Peering networking constraints; The Google-owned network has its own default route and will not import your network's default route to the Internet Peered networks can be configured to export static and dynamic routes to each other.8.8.. (BACK TO TOP)
New technologies like integrated artificial intelligence (AI), edge computing, 5G communications, and Internet of Things (IoT) products, as well as the emergence of customers as competitors with in-house chip design capabilities are forcing the semiconductor industry to shift away from a focus on engineering and operations and toward a strong focus on product development, new operating models, and new market penetration.g. We tested PowerScale using a synthetic EDA benchmark suite. Read Article (BACK TO TOP)
We are excited to announce that Google Cloud Managed Service for Prometheus is now generally available! Now you can get all the benefits of open source-compatible monitoring with the ease of use of Google-scale managed services. The rapid adoption of managed platforms and services across the cloud computing industry has shown that fewer and fewer organizations want to invest developer time into managing infrastructure. See Managed Service for Prometheus documentation to get started. (BACK TO TOP)
PostgreSQL uses transaction IDs (TXIDs, XIDs) to implement Multi-Version Concurrency Control semantics (MVCC). The PostgreSQL documentation explains the role of TXIDs as follows: PostgreSQL's MVCC transaction semantics depend on being able to compare transaction ID (XID) numbers: a row version with an insertion XID greater than the current transaction's XID is “in the future” and should not be visible to the current transaction. In short, catastrophic data loss..pid,\r\n p.datname,\r\n p.g. (BACK TO TOP)
As traditional Moore’s law improvements slow down, we are now turning to custom chips to continue improving performance and efficiency. Innovations like Google’s Tensor Processing Units (TPUs) and Video Coding Units (VCUs) have been incredibly valuable at sustainably meeting the growing demand for machine learning and video distribution services, and we expect to see additional custom chips that meet the emerging needs of our customers and users.g., semiconductor mask costs).g. Read Article (BACK TO TOP)
When we talk about reimagining the future of work, one group that’s often left out of the conversation is the frontline workforce. The pandemic, however, has reminded us of the importance of frontline workers. With the exodus of frontline workers in the ongoing Great Resignation , there’s now greater urgency for businesses to rethink the workplace experiences on the frontlines. By comparison, knowledge workers managed the transition to remote work relatively smoothly ... Read Article (BACK TO TOP)
On November 30th, 2021, Google submitted Knative to be considered as an incubating project, which began the process for handing over the project to be managed by the Cloud Native Computing Foundation (CNCF). Today we are pleased to acknowledge the completion of this process, allowing the next phase of community-driven innovation in Knative to begin. In 2018, the Knative project was founded and released by Google and subsequently developed in close partnership with IBM, Red Hat, VMware, and SAP. (BACK TO TOP)
Bulletin by Jakub Mikians