Bulletin for Friday, 10 Jun 2022
7 days digest
Go (Golang) Programming Blog - Ardan Labs on (1)
The Ably Blog (1)
Tech at Meta (1)
Mozilla Hacks – the Web developer blog (1)
Earthly Blog (1)
allegro.tech (1)
- How to include refactoring into product development roadmap? Reducing technical debt inspired by real options identification
Haki Benita (1)
A Few Thoughts on Cryptographic Engineering (1)
Retool blog (1)
Think Fast, Talk Smart: Communication Techniques (1)
RelyAbility Blog (1)
Sentry Blog RSS (1)
Graham King (1)
General Engineering Archives - Uber Engineering Blog (1)
Google AI Blog (2)
- LIMoE: Learning Multiple Modalities with One Sparse Mixture of Experts Model
- End-to-end Generative Pre-training for Multimodal Video Captioning
- Memory-level parallelism : Intel Ice Lake versus Amazon Graviton 3
- Data structure size and cache-line accesses
Weaveworks (2)
- GitOps - The Path to A Fully-Automated CI/CD Pipelines
- Instrumenting Real-World Pre-Deployment Checks for GitOps
LogicAI website (2)
- Towards data quality management at LinkedIn
- Overcoming challenges with Linux cgroups memory accounting
- Under the hood: Meta’s cloud gaming infrastructure
- Introducing Zelos: A ZooKeeper API leveraging Delos
- Cache made consistent: Meta’s cache invalidation solution
Future (3)
- Why the Software Supply Chain Needs More Security
- Info Diet: Peanut CEO Michelle Kennedy
- The Iron Man Model: How Startups and the Military Can Work Together
The CircleCI Blog Feed - CircleCI (4)
- How to review your CircleCI configuration
- Continuous integration for a production-ready Dockerized Django application
- Data structures for effective Python applications
- How to find and monitor engineering metrics for team success
Timescale Blog (4)
- Processing and Protecting Hundreds of Terabytes of Blockchain Data: Zondax’s Story
- How Prometheus Querying Works (and Why You Should Care)
- SQL Isn't That Hard (When You Have a Good Problem to Solve)
- The 2022 State of PostgreSQL Survey Is Now Open!
The Full Feed - All of the Packet Pushers Podcasts (5)
- Kubernetes Unpacked 002: Tackling Container Management And Kubernetes Complexity
- Day Two Cloud 150: Proactive Network Operations With Augtera (Sponsored)
- Tech Bytes: How Aruba NaaS Changes Network Consumption (Sponsored)
- Network Break 385: VMware, Juniper Release New Security Tools; Judge Orders IBM To Pay BMC $1.6 Billion
- Heavy Networking 633: Building DPU Apps With NVIDIA DOCA (Sponsored)
Blog – Hackaday (5)
- Throw Out That Box? No, Build a Shelving Unit
- Mouse Charging Mod Shows Even Simple Hacks Can End Up Complex
- Swapped ROM Revives Ailing HP-48S Calculator
- The Case for Designer Landline Phones
- The Compu-tor is a Raspberry Pi Laptop in a Mahogany Case
- Going through the news (Go Time #233)
- DevOps teams with shared responsibilities (Ship It! #56)
- Generalist models & Iceman's voice (Practical AI #180)
- Fireside chat with Jack Dorsey (Founders Talk #91)
- Live from Remix Conf! (JS Party #228)
- Enhanced Teams Dashboard: Monitor trendlines, personalization, and data granularity
- The Great Decentralization? Geographic shifts and where tech talent is moving next
- On the quantum internet, data doesn’t stream; it teleports (Ep. 450)
- Remote work is killing big offices. Cities must change to survive
- Kidnapping an NFT (Ep. 449)
Pluralistic: Daily links from Cory Doctorow (5)
- Pluralistic: 08 Jun 2022
- Pluralistic: 07 Jun 2022
- Pluralistic: 06 Jun 2022
- Pluralistic: 05 Jun 2022
- Pluralistic: 03 Jun 2022
- From petroleum engineering to machine learning
- Simplifying BERT-based models to increase efficiency, capacity
- ‘The next frontier in robotics’
- Compressing BART models for resource-constrained operation
- Amazon Research Awards issues spring 2022 call for proposals
Towards Data Science - Medium (6)
- Five essential things you must know to learn Tableau
- Tutorial: Data-Oriented-Python in 15 minutes — Less Complexity through Data/Logic Separation
- How To Deal With Missing Values in Data Science
- Creating a Multilayer Perceptron (MLP) Classifier Model to Identify Handwritten Digits
- Transactions in a Big Data World
- Meet HistGradientBoostingClassifier
- How Queen Elizabeth II’s Platinum Jubilee had an impact on the Internet
- A new portal for Project Galileo participants
- Private Access Tokens: eliminating CAPTCHAs on iPhones and Macs with open standards
- In Ukraine and beyond, what it takes to keep vulnerable groups online
- Let’s celebrate the 8th anniversary of Project Galileo!
- HTTP RFCs have evolved: A Cloudflare view of HTTP usage trends
- Cloudflare observations of Confluence zero day (CVE-2022-26134)
- Cloudflare customers are protected from the Atlassian Confluence CVE-2022-26134
Cloud Blog (20)
- TELUS: Solving for workers’ safety with edge computing and 5G
- Accelerating BigQuery migrations with automated SQL translation
- WebGL-powered maps features now generally available
- Building AI in the cloud: An easier way with Google Cloud and NVIDIA
- Graph Data Science on Google Cloud: Neo4j AuraDS and Vertex AI
- Getting started with ML: 25+ resources recommended by role and task
- Reimagining AutoML with Google research: announcing Vertex AI Tabular Workflows
- Accelerating ML with Vertex AI: From retail and finance to manufacturing and automotive
- Accelerate the deployment of ML in production with Vertex AI
- Infrastructure Security in Google Cloud
- All signs point to Chrome OS for kiosks and signage
- Secure, Scalable, Discoverable Research Environment with Simplified Chargeback
- Google Cloud supports higher education with Cloud Digital Leader program
- Palexy empowers retailers to increase in-store sales with the help of Google Cloud
- How Google Cloud can help secure your software supply chain
- Even more pi in the sky: Calculating 100 trillion digits of pi on Google Cloud
- Connecting Apigee to GKE using headless services and Cloud DNS
- Updates coming for Authorized Networks and Cloud Run/Functions on GKE
- What’s new with Google Cloud
- Security insights from Chrome browser delivered with Splunk
https://www.ardanlabs.com/blog/
Introduction A blockchain is an integrated solution of different computer science problems in the form of a single, append-only, publicly available, transparent, and cryptographically auditable database that runs in a distributed and decentralized environment. I’ve heard many times that blockchain is a technology looking for a problem to solve. I disagree with that assessment because the tech and computer science behind blockchain has practical uses in everyday engineering problems. (BACK TO TOP)
This article considers the system architecture needed for a collaborative multiplayer experience. (BACK TO TOP)
There’s a new paradigm for where and how we work, prioritizing the optimal experience for the individual and most effective ways to collaborate. Regardless of environment or technological tools, everyone should have equity — to speak, be heard, and feel included — when collaborating with colleagues. Enhancing video conferencing with features that ensure optimal sound […] The post How we’re building a more connected workplace experience appeared first on Tech at Meta . (BACK TO TOP)
https://www.hackerfactor.com/blog/
I manage a few honeypots: Some have no network address and just watch for network traffic. They keep an eye out for suspicious activity. Some are specific web pages that act as a canary, alerting me before an attacker ramps up. Some appear as online services. These watch for when attackers scan for new vulnerabilities in existing services. And some are entire fake domains, waiting to see what new comes in. One of my fake domains hosts a web site. Behind the scenes, it tracks everything.jones.z.. (BACK TO TOP)
The Bergamot project is a collaboration between Mozilla, University of Edinburgh, Charles University in Prague, the University of Sheffield, and University of Tartu with funding from the European Union’s Horizon 2020 research and innovation programme. It brings MT to the local environment, providing small, high-quality, CPU optimized NMT models. The Firefox Translations web extension utilizes proceedings of project Bergamot and brings local translations to Firefox. (BACK TO TOP)
Welcome back to a series on AWS Lambdas. Today I’ll be running a full REST HTTP API in a single lambda. Also, I’ll discuss why you might want to do so – there are some exciting advantages to this approach. Background An earlier post on containers in lambdas showed up on hacker news and got some fun questions about using Lambdas to scale-out stateless web apps. 1 I can’t see why this wouldn’t work. But before digging in myself I asked around online. I want to match use http.Request) { io.dkr.ecr. (BACK TO TOP)
How to include refactoring into product development roadmap? Reducing technical debt inspired by real options identification
Nowadays, technical debt can be considered the bread and butter of most IT-powered enterprises around the world. Almost every company that survived the startup phase and managed to deliver its first products to customers will face at some point technical challenges related to past architectural decisions. Although code engineering gets better every year, we cannot argue with the obvious fact of life: the market will always force many of us to deliver tech products faster than we wish.g.mckinsey. (BACK TO TOP)
Tailscale runs on many platforms, including macOS, and has a macOS version available in the App Store. If you’re using macOS at work, however, your team might not be able to roll out Tailscale to your entire organization if not everyone has an Apple ID. In this case, it’s common to use a mobile device management (MDM) solution that allows you to distribute applications that are not available in the App Store. Starting with Tailscale v1. To get started, download the standalone macOS application . (BACK TO TOP)
Concurrency is not very intuitive - you need to train your brain to consider what happens when multiple processes execute a certain code block at the same time. In this article I present common concurrency challenges and how to overcome them with minimal locking. (BACK TO TOP)
Fork this template! At Uma Chingunde ’s suggestion, the learning circle I’m part of is doing a short detour on career trajectory, and I’ve written up a short template to use. This is similar to a career narrative, but with more focus on self-diagnosis than something presentable to others. I’ve been experimenting with reusable templates over on Infrastructure Engineering , and decided to try something similar here. It’s just a random template, not something sacrosanct Fill in the sections. (BACK TO TOP)
https://blog.cryptographyengineering.com
Last week a group of technologists, including Bruce Schneier, sent a letter to Congress outlining their concerns around cryptocurrency and urging Congress to regulate the space. Now let me be the first to say that I broadly support this goal. I have no problem with the idea of legislators (intelligently) passing laws to regulate cryptocurrency. … Continue reading In defense of crypto(currency) → (BACK TO TOP)
https://blog.pragmaticengineer.com/
Approaches for shipping code to production reliably, every time. This is a content summary only. Click on the blog title to continue reading this post and browse The Pragmatic Engineer blog. (BACK TO TOP)
Eerder dit jaar spraken Kustaw Bessems en ik elkaar in een aflevering van de Volkskrant podcast ‘Stuurloos’. In een uitzending van meer dan een uur behandelden we waarom het zo moeilijk is voor de overheid en grote bedrijven om mensen te werven die ergens echt veel vanaf weten, en die mensen vervolgens ook te behouden. (BACK TO TOP)
In this tutorial, we use Vue's new composition API to build a checkbox and a checkbox group. You'll learn how to use the brand-new API to expose props and emit events, as well as how to structure Vue components using the SFC concept. (BACK TO TOP)
https://www.microsoft.com/security/blog
Winners of the Microsoft Security Excellence Awards were announced as Microsoft executives and MISA members gathered for the first time in more than two years. The post Announcing 2022 Microsoft Security Excellence Awards winners appeared first on Microsoft Security Blog . (BACK TO TOP)
Last September, Slack released Clips, allowing users to capture video, audio, and screen recordings in messages to help distributed teams connect and share their work. We’ve continued iterating on Clips since its release, adding thumbnail selection, background blur, and most recently, background image replacement. This blog post provides a deep dive into our implementation of […] The post Building Background Effects for Clips appeared first on Slack Engineering . (BACK TO TOP)
https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast
“It's not reassuring when we don't know the answers to critically important questions involved in health and wellbeing. But it's far more of a problem if we try to pretend we do.” In this episode of Think Fast, Talk Smart , Stanford Medical School dean Lloyd Minor sits down with podcast host Matt Abrahams to discuss transparency in leadership. “Rather than pushing ambiguity away, we should lean into it, and use it as a stimulus to guide our communication in more effective ways. (BACK TO TOP)
By Astha Singhal , Lakshmi Sudheer , Julia Knecht The Application Security teams at Netflix are responsible for securing the software footprint that we create to run the Netflix product, the Netflix studio, and the business. Our customers are product and engineering teams at Netflix that build these software services and platforms. The Netflix cultural values of ‘Context not Control’ and ‘Freedom and Responsibility’ strongly influence how we do Security at Netflix.g.g.g. (BACK TO TOP)
Today, I believe we cannot successfully answer several key questions about SRE. Let's start with the most important one: how can we understand what reliability customers want and need? (BACK TO TOP)
Frontend technologies typically talk to several services in your backend, and those services talk to other services. At the root of every… (BACK TO TOP)
/
Thanks to Address Space Layout Randomization you can use the address of a stack variable as a zero-cost random number. (BACK TO TOP)
Introduction Justification for Identity Verification Latin America is a rich cultural region, known for its world-renowned gastronomy, its abundant biodiversity, and its welcoming population. However, socio-economic inequality has been a challenge for the region, and is generally considered a major … The post Uber’s Real-Time Document Check appeared first on Uber Engineering Blog . (BACK TO TOP)
https://eli.thegreenplace.net/
Back in 2011, Rob Pike gave a talk on the topic of Lexical Scanning in Go , where he presented an interesting approach to lexical analysis with coroutines (implemented via goroutines communicating over a channel). Since I've been pondering the connection between coroutines and state machines in the past, Rob's talk inspired me to try approximating this approach in Python using sub-generators . There's something in this approach that feels elegant - it's a problem very well suited for coroutines. (BACK TO TOP)
Posted by Basil Mustafa, Research Software Engineer and Carlos Riquelme, Research Scientist, Google Research, Brain team Sparse models stand out among the most promising approaches for the future of deep learning. Instead of every part of a model processing every input (“dense” modeling), sparse models employing conditional computation learn to route individual inputs to different “experts” in a potentially huge network. This has many benefits. The largest LIMoE achieves 84.g.g.g.g.2% and 76.g. (BACK TO TOP)
Posted by Paul Hongsuck Seo and Arsha Nagrani, Research Scientists, Google Research, Perception Team Multimodal video captioning systems utilize both the video frames and speech to generate natural language descriptions (captions) of videos. Such systems are stepping stones towards the longstanding goal of building multimodal conversational systems that effortlessly communicate with users while perceiving environments through multimodal input streams. Unlike video understanding tasks (e.g.25 1. (BACK TO TOP)
One of the most expensive operation in a processor and memory system is a random memory access. If you try to read a value in memory, it can take tens of nanosecond on average or more. If you are waiting on the memory content for further action, your processor is effectively stalled. While our processors … Continue reading Memory-level parallelism : Intel Ice Lake versus Amazon Graviton 3 (BACK TO TOP)
On many systems, memory is accessed in fixed blocks called “cache lines”. On Intel systems, the cache line spans 64 bytes. That is, if you access memory at byte address 64, 65… up to 127… it is all on the same cache line. The next cache line starts at address 128, and so forth. In … Continue reading Data structure size and cache-line accesses (BACK TO TOP)
Automating software delivery is a critical priority for any organization that follows the DevOps paradigm. Successful implementation of a CI/CD pipeline largely hinges on automating several manual tasks that are labor-intensive. To that end, scripts, plugins, and other tools help standardize various production and deployment processes and more importantly, eliminate the possibility of human error in the pipeline. But we can offer a solution in the form of GitOps. 1. 2. 3. 4. (BACK TO TOP)
GitOps ensures the agility and scalability that containerization promises via efficient container management using orchestrators like Kubernetes. One key factor that accelerated the adoption of GitOps is its comprehensive operating model. It allows you to make changes to the code, identify errors, review code and roll back changes through a simple process. Despite these strengths, there are certain pre-deployment checks that would benefit any GitOps practice. That is the focus of this post. 1. (BACK TO TOP)
Introduction KaggleDays x Z by HP championship is a series of events that are conducted in collaboration with Z by HP as the sponsors with LogicAI and Kaggle as the organizers. The Championship consists of 12 online meetups held across the globe every 3 to 4 weeks with a final in-person event in Barcelona, Spain. Average top 10 teams on Leaderboard Teaming up is one of the most important aspects that affect the performance of a team in a KaggleDays Championship. (BACK TO TOP)
Introduction KaggleDays x Z by HP championship is a series of events that are conducted in collaboration with Z by HP as the sponsors with LogicAI and Kaggle as the organizers. The Championship consists of 12 online meetups held across the globe every 3 to 4 weeks with a final in-person event in Barcelona, Spain. Winner’s Profiles Winners stand out from the other participants in every meetup and show a general trend that most of the winning teams are consists of Masters and Grandmasters. (BACK TO TOP)
Netflix has a new documentary series airing next week -- "Web of Make Believe: Death, Lies & the Internet" -- in which Yours Truly apparently has a decent amount of screen time. The debut episode explores the far-too-common harassment tactic of "swatting" -- wherein fake bomb threats or hostage situations are phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a target’s address. (BACK TO TOP)
The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. The new guidelines state that prosecutors should avoid charging security researchers who operate in “good faith” when finding and reporting vulnerabilities. (BACK TO TOP)
https://engineering.linkedin.com/blog.rss.html
Co-authors: Liangzhao Zeng, Ting Yu (Cliff) Leung, and Jimmy Hong Introduction Data is at the heart of all our products and decisions at LinkedIn and the quality of our data is vital to our success. While not an uncommon problem, our scale, hundreds of thousands of pipelines and streams as well as over an exabyte of data in our data lake alone, presents unique challenges. The metadata […] (BACK TO TOP)
Introduction LinkedIn's de facto search solution, Galene, is a Search-as-a-Service infrastructure that powers a multitude of search products at LinkedIn, from member-facing searches (such as searching for jobs or other members) to internal index searches. Galene’s responsiveness and reliability are paramount as it caters to many critical features. This post discusses debugging an issue where the hosts ran out of memory and became inaccessible, even though the applications are limited by cgroups. (BACK TO TOP)
The promise of cloud gaming is a promise to democratize gaming. Anyone who loves games should be able to enjoy them and share the experience with their friends, no matter where they’re located, and even if they don’t have the latest, most expensive gaming hardware. Facebook launched its cloud gaming platform in 2020 to give [...] Read More... The post Under the hood: Meta’s cloud gaming infrastructure appeared first on Engineering at Meta . (BACK TO TOP)
Within large-scale services, durable storage, distributed leases, and coordination primitives such as distributed locks, semaphores, and events should be strongly consistent. At Meta, we have historically used Apache ZooKeeper as a centralized service for these primitives. However, as Meta’s workload has scaled, we’ve found ourselves pushing the limits of ZooKeeper’s capabilities. Modifying and tuning ZooKeeper [...] Read More... (BACK TO TOP)
Caches help reduce latency, scale read-heavy workloads, and save cost. They are literally everywhere. Caches run on your phone and in your browser. For example, CDNs and DNS are essentially geo-replicated caches. It’s thanks to many caches working behind the scenes that you can read this blog post right now. Phil Karlton famously said, “There [...] Read More... The post Cache made consistent: Meta’s cache invalidation solution appeared first on Engineering at Meta . (BACK TO TOP)
Kim Lewandowski is co-founder and head of product at security startup Chainguard. Prior to Chainguard, she worked as a product manager at Google, most recently with a focus on securing the company’s development pipeline and the open source tools it used. In this interview, she discusses the concept of a secure software supply chain and... Read More The post Why the Software Supply Chain Needs More Security appeared first on Future . (BACK TO TOP)
Info Diet offers a peek into the personally curated feeds and media habits of the people shaping the future. In each installment, a different builder spends two days chronicling all the content they consume in order to stay ahead of the curve. This time: Michelle Kennedy, founder and CEO of Peanut, an online community to... Read More The post Info Diet: Peanut CEO Michelle Kennedy appeared first on Future . (BACK TO TOP)
Afghanistan. North Korea. Russia. The South China Sea. Open a newspaper these days and you’ll read about the numerous problems facing America’s military. Global threats and a dwindling technological advantage have caused the Pentagon to cozy up to Silicon Valley, a relationship from which Palantir and Anduril are but two successful outcomes. Yet, most dual-use... Read More The post The Iron Man Model: How Startups and the Military Can Work Together appeared first on Future . (BACK TO TOP)
Configuration files can take some time to set up, but after that initial push they are easy to forget about. “If it’s not broken, don’t fix it” is a common approach that many developers take with their configuration files. But when it comes to your continuous integration pipelines, small changes can have huge benefits. The DCE team has reviewed hundreds of configuration files and has created a process that can be used with any project. Don’t feel like you need to tackle these issues first. (BACK TO TOP)
This tutorial covers: Cloning and setting up the demo project Adding the CircleCI configuration file including job structure and workflow Using parallelism and splitting tests Continuous integration has become a widely accepted practice for software projects. As more technologies are introduced in both continuous integration and software development, developers are looking for practical ways to benefit from them. That is why I wrote this tutorial.2 application.io. A GitHub account .py , local... (BACK TO TOP)
This tutorial covers: What Python data structures are and how to use them How to implement an API powered by Python data structures How to automate tests for your Python API Because computers rely on data to execute instructions, computing will always entail data interaction. The amount of data can be overwhelming in real world applications, so developers must consistently devise methods to access it quickly and efficiently in a programmatic way. Items are the values contained within a list.py . (BACK TO TOP)
What are engineering metrics? Engineering metrics are data that teams can use to make informed decisions and operate at maximum efficiency. Some data about your software development process, like story points completed, have proven less than helpful. In this guide, we will describe the data you can use to more insightfully measure your team’s success. Learn how to measure DevOps success with four key benchmarks for your engineering teams. Prioritize efforts for pipeline improvement. (BACK TO TOP)
https://www.timescale.com/blog/
Known for its Ledger apps development, Zondax struggled to quickly process dozens of terabytes of blockchain data before finding TimescaleDB. Thanks to hypertables and other optimizations, the software company unlocked the key to fast and responsive services in real time. (BACK TO TOP)
Learn how Prometheus indexing works to understand your PromQL queries perform the way they do—and get some tips to achieve faster results. (BACK TO TOP)
To celebrate our love for SQL, we interviewed several of our employees and favorite PostgreSQL community members for this series on how they learned and came to love SQL. Today, we're speaking with David Kohn, an electrochemist turned database enthusiast. (BACK TO TOP)
We’re surveying the PostgreSQL community for the third year to learn more about how developers use and deploy the open-source database and surface collective trends and opportunities. (BACK TO TOP)
In this episode, Michael Levan chats with Neil Cresswell, CEO and Co-Founder of Portainer.io. They talk about the challenges of Kubernetes and how everyone is trying to navigate its complexities. They also dive into Kubernetes security, networking, and management. The post Kubernetes Unpacked 002: Tackling Container Management And Kubernetes Complexity appeared first on Packet Pushers . (BACK TO TOP)
Sponsor and startup Augtera Networks joins Day Two Cloud to discuss Augtera's proactive network analysis and operations product, which is meant to make you aware of problems before they become…problems. Augtera brings together traditional network sources such as flows and SNMP, plus telemetry and metadata to provide actionable information across networks you own and networks you don't. (BACK TO TOP)
Today on the Tech Bytes podcast we’re talking about Network as a Service with sponsor Aruba, a Hewlett Packard Enterprise company, including how Aruba defines NaaS, the market appetite for network as a service, customer examples, and more. The post Tech Bytes: How Aruba NaaS Changes Network Consumption (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)
Network Break 385: VMware, Juniper Release New Security Tools; Judge Orders IBM To Pay BMC $1.6 Billion
Today's Network Break podcast discusses a new threat analytics product from VMware, new security features from Juniper's cloud-delivered security service, a report from Morgan Stanley on why the big network vendors are chasing the enterprise campus, and more IT news. The post Network Break 385: VMware, Juniper Release New Security Tools; Judge Orders IBM To Pay BMC $1.6 Billion appeared first on Packet Pushers . (BACK TO TOP)
In today's Heavy Networking podcast, sponsored by NVIDIA, we explore DOCA on Bluefield DPUs. DOCA is a runtime operating system on the DPU including tools for provisioning, deploying, and orchestrating containerized services. It's also an SDK to supports a range of operating systems and distributions and includes drivers, libraries, and tools. Our guests are Justin Betz and Wes Kennedy, both Technical Marketing Engineers with NVIDIA. (BACK TO TOP)
Are you one of those people who hoards cardboard for someday, and then periodically breaks it all down and puts it out for recycling because you haven’t done anything with …read more (BACK TO TOP)
Hardware hacks have something in common with renovations that involve taking down a wall: until one actually gets started and opens things up, there’s no telling what kind of complications …read more (BACK TO TOP)
Buying broken gear for cheap is time honored hacker tradition, and while we might not always be successful in reviving it, rarely do we come away empty handed. There’s always …read more (BACK TO TOP)
Long before the idea of hot dog-shaped iPhone cases, Otter Boxen, or even those swappable Nokia face plates, people were just as likely to express themselves with their landline phones. …read more (BACK TO TOP)
The Compu-tor, designed by [Henry Edwards], is one of those things that doesn’t neatly fit into any categories. It is a clamshell-type portable computer, although unlike most laptops, it doesn’t …read more (BACK TO TOP)
We’re trying something new this week: discussing the news! Natalie, Kris & Ian weigh in on GopherCon’s move to Chicago, Google DDoSing SourceHut, reflections on Go’s success, and a new/old proposal for anonymous function syntax. (BACK TO TOP)
Today we are talking with Maikel Vlasman, technical lead for a large Dutch machine construction company, and a cloud engineer by heart. We cover self-updating GitLab & ArgoCD, Maikel’s thinking behind dev environment setup and a Kubernetes workshop that he is preparing for his team. The goal is to function as a true DevOps team with shared responsibilities. This conversation started as a thread in our community Slack - link in the show notes. (BACK TO TOP)
In this “fully connected” episode of the podcast, we catch up on some recent developments in the AI world, including a new model from DeepMind called Gato. This generalist model can play video games, caption images, respond to chat messages, control robot arms, and much more. We also discuss the use of AI in the entertainment industry (e.g., in new Top Gun movie). (BACK TO TOP)
Adam was invited by our friends at Square to interview Jack Dorsey as part of their annual developer conference called Square Unboxed. Jack Dorsey is one of the most prolific CEOs out there — he’s a hacker turned CEO and is often working at the very edge of what’s to come (at scale). Jack is focused on what the future has to offer, he’s considered an innovator by many. He’s also a Bitcoin maximalist and has positioned himself and Block long on Bitcoin. (BACK TO TOP)
Ali & Divya recorded seven (!) awesome conversations all about Remix and the web ecosystem live on-stage at the first-ever Remix Conf after-party! (BACK TO TOP)
Our new Dashboard on Stack Overflow for Teams provides better insights into how your organization uses their knowledge The post Enhanced Teams Dashboard: Monitor trendlines, personalization, and data granularity appeared first on Stack Overflow Blog . (BACK TO TOP)
Distributed work may hold the key to creating forward thinking metropolises. The post The Great Decentralization? Geographic shifts and where tech talent is moving next appeared first on Stack Overflow Blog . (BACK TO TOP)
The home team chats about quantum computing, Schrödinger’s ill-fated feline, and how software engineers really spend their time. The post On the quantum internet, data doesn’t stream; it teleports (Ep. 450) appeared first on Stack Overflow Blog . (BACK TO TOP)
If your office is where you live now, would you live in your old office? The post Remote work is killing big offices. Cities must change to survive appeared first on Stack Overflow Blog . (BACK TO TOP)
Friend of the show Adam Lear, a staff software engineer on the public platform at Stack Overflow, joins the home team to talk about one of the biggest tech acquisitions in history, why Ceora includes memes in her talks, and what happens when somebody “kidnaps” a celebrity’s NFT. The post Kidnapping an NFT (Ep. 449) appeared first on Stack Overflow Blog . (BACK TO TOP)
Today's links Powered wheelchairs and Right to Repair: An unprecedented legislative victory in Colorado. Hey look at this: Delights to delectate. This day in history: 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Powered wheelchairs and Right to Repair (permalink) Here's a miserable story with a mostly happy ending, one that leaves us with work to do, sure, but also with clarity on what to do next and how to do it.co. (BACK TO TOP)
Today's links James Bridle's "Ways of Being": Dispatches from the more than human world. Fake Christian health insurance and other big cons: If you have to trick people into hearing your message, you are in a cult. Hey look at this: Delights to delectate. https://us.macmillan.com/books/9780374601119/waysofbeing Bridle, an English artist and technologist who lives in Greece, pulls on so many threads to tell this tale. https://jamesbridle. The impact is bidirectional. https://www.nbcnews.archive. (BACK TO TOP)
Today's links Podcasting "Against Cozy Catastrophes": My Medium column about the failure of market-based pensions. MBAs and wage stagnation: Going to business school makes you a dick." It's a column about the failure of a market-based, individual based approach to the collective problem of retirement savings. https://doctorow.medium. Some of this came from the private sector: employer-provided defined-benefits pensions (guaranteeing a proportion of your final salary from retirement until death). (BACK TO TOP)
Today's links The Big Box of Sparkly Unicorn Magic: If Hobbes was a snarky unicorn and Calvin was an awesome little girl. Hey look at this: Delights to delectate. This day in history: 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading The Big Box of Sparkly Unicorn Magic (permalink) Back in 2015, when my daughter Poesy was seven, I read her a story every night at bedtime.craphound. And I was even more glad to do it.tor.co. (BACK TO TOP)
Today's links House sales are cratering but inventory is soaring: You are the sucker at the table. Hey look at this: Delights to delectate. This day in history: 2002, 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading House sales are cratering but inventory is soaring (permalink) When I moved to the UK in the early 2000s, nearly everyone I met fancied themselves a real-estate investment genius. https://gen.medium.9%.6%.co. (BACK TO TOP)
How Chukwudi Chukwudozie’s path to Amazon was paved by a passion for problem-solving and growth. (BACK TO TOP)
New method would enable BERT-based natural-language-processing models to handle longer text strings, run in resource-constrained settings — or sometimes both. (BACK TO TOP)
Zoox principal software engineer Olivier Toupet on company’s autonomous robotaxi technology (BACK TO TOP)
Combination of distillation and distillation-aware quantization compresses BART model to 1/16th its size. (BACK TO TOP)
Submission period closes on July 8. (BACK TO TOP)
https://towardsdatascience.com
A guide with free resources for building your skills Continue reading on Towards Data Science » (BACK TO TOP)
A 3 step tutorial teaching you the three main concepts of the data-oriented approach to Python. Continue reading on Towards Data Science » (BACK TO TOP)
Three practical ways to deal with missing values in a DS project Continue reading on Towards Data Science » (BACK TO TOP)
Neural Networks and Deep Learning Course: Part 16 Continue reading on Towards Data Science » (BACK TO TOP)
Why ACID support is essential for model prediction reproducibility? Continue reading on Towards Data Science » (BACK TO TOP)
A more flexible and scalable GradientBoostingClassifier Continue reading on Towards Data Science » (BACK TO TOP)
The UK's Internet traffic was clearly impacted with less traffic than usual during this weekend's celebration of Queen Elizabeth II’s Platinum Jubilee. We also show impact from Canada to New Zealand and the royals and news websites (BACK TO TOP)
To provide Galileo participants with one place to access resources, configuration tips, product explainers, and more, we built the Cloudflare Social Impact Projects Portal (BACK TO TOP)
Today we’re announcing Private Access Tokens, a completely invisible, private way to validate that real users are visiting your site (BACK TO TOP)
As we celebrate the eighth anniversary of Project Galileo, we want to provide a view into the type of cyber attacks experienced by organizations protected under the project (BACK TO TOP)
We started Project Galileo in 2014 with the simple idea that organizations that work in vulnerable yet essential areas of human rights and democracy building should not be taken down because of cyber attacks (BACK TO TOP)
HTTP/3 is now RFC 9114. We explore Cloudflare's view of how it is being used (BACK TO TOP)
On 2022-06-02 at 20:00 UTC Atlassian released a Security Advisory relating to a remote code execution (RCE) vulnerability affecting Confluence Server and Confluence Data Center products. This post covers our current analysis of this vulnerability (BACK TO TOP)
On June 02, 2022 Atlassian released a security advisory for their Confluence Server and Data Center applications, highlighting a critical severity unauthenticated remote code execution vulnerability. (BACK TO TOP)
https://cloud.google.com/blog/
Editor’s note : In February 2021, Google Cloud and TELUS announced a 10-year strategic alliance to drive innovation of new services and solutions across data analytics, machine learning, and go-to-market strategies that support digital transformation within key industries, including communications technology, healthcare, agriculture, and connected home. Multi-Access Edge Computing (MEC) is a buzzword that offers an opportunity to do just this... Read Article (BACK TO TOP)
Google’s data cloud enables customers to drive limitless innovation and unlock the value of their data via its robust offerings under a single, unified interface. By migrating their data ecosystems to Google Cloud, organizations are able to break down their data silos and harness the full potential of their data. However, historically, migrating data warehouses has not been an easy task. We hope it speeds up and lowers the cost of your migrations to BigQuery... Read Article (BACK TO TOP)
At last year’s Google I/O, our team announced the preview release of a set of new WebGL-powered maps features for the Maps JavaScript API. These features give you unprecedented control of the vector basemap, as part of the customization and styling options available with Cloud-based maps styling . Check out our demo to explore these features more. This means you can create performant, beautiful maps experiences never before possible with Maps Javascript API. From using deck.gl and threejs. (BACK TO TOP)
NVIDIA GPU-powered instances on Google Cloud provide an optimal platform for organizations to develop their AI applications on the latest hardware and software stack, then seamlessly deploy those applications at scale in production. Simplifying Workflows to Speedup AI Developments NVIDIA recently announced the One Click Deploy feature on the NVIDIA NGC catalog , the hub for GPU-optimized AI software. All of the AI models in the catalog come with credentials. Read Article (BACK TO TOP)
In January, we previewed Neo4j’s and Google Cloud Vertex AI’s partnership in a blog about how you can use graphs for smarter AI when using Neo4j AuraDS to generate graph embeddings. This blog post garnered a lot of attention from data scientists looking to amplify their machine learning (ML) pipelines by feeding knowledge (graph features) of the graph to enhance the ML model's predictability. Since then, Neo4j released a new 2.0 version of the Neo4j Graph Data Science Platform.TabularDataset. (BACK TO TOP)
Wondering how to get started with Vertex AI ? Below, we've collected a list of resources to help you build and hone your skills across data science, machine learning, and artificial intelligence on Google Cloud. We've broken down the resources by what we think a Data Analyst , Data Scientist , ML Engineer , or a Software Engineer might be most interested in. If you'd like one place to start, check out Best practices for implementing machine learning on Google Cloud . (BACK TO TOP)
Earlier this year, we shared details about our collaboration with USAA , a leading provider of insurance and financial services to U.S. military members and veterans, who leveraged AutoML models to accelerate the claims process. This use case combines a variety of technologies that extend well beyond the insurance industry, among them a particularly sophisticated approach to tabular data, or data structured into tables with columns and rows (e.g... Read Article (BACK TO TOP)
Artificial intelligence (AI) and machine learning (ML) are transforming industries around the world, from trailblazing new frontiers in conversational human-computer interactions and speech-based analysis, to i mproving product discovery in retail,to unlocking medical research with advancements like AlphaFold. Our mission is to remove every barrier in the way of deploying useful and predictable ML at scale. In fact, through Vertex AI and BigQuery, we have seen 2.S... Read Article (BACK TO TOP)
As part of today’s Google Cloud Applied ML Summit , we’re announcing a variety of product features and technology partnerships to help you more quickly and efficiently build, deploy, manage, and maintain machine learning (ML) models in production. Our performance tests found a 2.5x increase in the number of ML predictions generated through Vertex AI and BigQuery in 2021, and a 25x increase in active customers for Vertex AI Workbench in just the last six months. and/or its affiliates in the U.S. (BACK TO TOP)
The security of the infrastructure that runs your applications is one of the most important considerations in choosing a cloud vendor. Google Cloud’s approach to infrastructure security is unique. Google doesn’t rely on any single technology to secure its infrastructure. Rather, it has built security through progressive layers that deliver defense in depth. They are monitored 24/7 by high-resolution cameras that can detect and track intruders. For more #GCPSketchnote, follow the GitHub repo . (BACK TO TOP)
Here’s your sign. Customers and employees want to be delighted, and delivering those experiences is key. You may be wondering how to create these premium experiences, and you may have even tried to no avail in the past. Deploying kiosks and digital signage are two ways to help users with information, transactions, and more, but the route to delight hasn’t been so straightforward. Many solutions create more IT overhead, increase security risks, and are prone to instability. (BACK TO TOP)
Healthcare data is being generated at an exponential rate, currently representing an estimated 30% of the world’s data 1 . The volume, speed, and variety of the data that is created can make it quite difficult for researchers and academic professionals to consume, analyze, and share insights at scale. At Google Cloud, we’re helping bring researchers scalable and secure healthcare research workspaces to share data and provision resources more efficiently. 1 Source: https://www.rbccm. (BACK TO TOP)
College and university faculty can now easily teach cloud literacy and digital transformation with the Cloud Digital Leader track , part of the Google Cloud career readiness program . The new track is available for eligible faculty who are preparing their students for a cloud-first workforce. As part of the track, students will build their cloud literacy and learn the value of Google Cloud in driving digital transformation, while also preparing for the Cloud Digital Leader certification exam. (BACK TO TOP)
Many people are again crowding store aisles as they look for their favorite products and eagerly try on clothing, shoes, and jewelry. Although some shoppers purchase multiple items, others leave the store empty handed. As retailers know, there are many possible reasons why some people only window shop. Perhaps a favorite item is too expensive, out of stock, or too hard to find in the store. That’s why we built Palexy . We’re also seeing Tau VMs reduce video decoding costs by up to 40%. (BACK TO TOP)
With the recent announcement of Assured Open Source Software service , Google Cloud can help customers secure their open source software by providing them with the same open source packages that Google uses. By getting security assurances from using these open source packages, Google Cloud customers can enhance their security posture and build their own software using the same tools that we use such as Cloud Build , Artifact Registry and Container/Artifact Analysis ... Read Article (BACK TO TOP)
Records are made to be broken. In 2019, we calculated 31.4 trillion digits of π — a world record at the time. Then, in 2021, scientists at the University of Applied Sciences of the Grisons calculated another 31.4 trillion digits of the constant, bringing the total up to 62.8 trillion decimal places. Today we're announcing yet another record: 100 trillion digits of π. This achievement is a testament to how much faster Google Cloud infrastructure gets, year in, year out. Program : y-cruncher v0. (BACK TO TOP)
We’ve recently supported an organization who wanted to expose its Google Kubernetes Engine (GKE) backend behind Apigee X . A quite common architecture, which most of the users delivering modern web applications on Google Cloud tend to build upon. In this scenario, Google’s API gateway, Apigee , receives requests and performs L7 routing, redirecting you to the correct backend application, running as one or more pods on GKE. This may increase latency and add management overhead... Read Article (BACK TO TOP)
We recently received helpful information through the Vulnerability Rewards Program for Authorized Networks and Cloud Run/Functions on Google Kubernetes Engine (GKE). Based on that information, we updated our product documentation and prioritized a plan to make engineering changes to GKE to restrict access to only GKE-related services. Our existing firewall rules allow the Kubernetes API server’s IP address to be reachable from the Cloud Run and Cloud Functions services. (BACK TO TOP)
Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more. Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here: Google Cloud blog 101: Full list of topics, links, and resources . Week of May 30 - June 3, 2022 Cloud Deploy New Region - Cloud Deploy is now available in the australia-southeast1 (Syndey) region. Learn more .37. (BACK TO TOP)
Two weeks ago, we announced the Chrome Enterprise Connectors Framework, enabling plug-and-play integrations with industry-leading security solutions and platforms. Together with our security partners, this new framework will help organizations work toward a Zero Trust model to keep their corporate data and users secure. This feature is supported by the Google Chrome Add-on for Splunk available for Splunk Cloud Platform and Splunk Enterprise. Setting up is simple.google. (BACK TO TOP)
Bulletin by Jakub Mikians