Skip to content

Latest commit

 

History

History
1626 lines (766 loc) · 84.1 KB

bulletin-2022-09-09.md

File metadata and controls

1626 lines (766 loc) · 84.1 KB

Bulletin for Friday, 09 Sep 2022

7 days digest


The Technium (1)


Eugene Yan (1)


Stratechery by Ben Thompson (1)


Krebs on Security (1)


Mozilla Hacks – the Web developer blog (1)


Slack Engineering (1)


Bert Hubert's writings (1)


the singularity is nearer (1)


Graham King (1)


Programming Digest (1)


Julia Evans (1)


Timescale Blog (1)


ongoing by Tim Bray (1)


Tech at Meta (1)


LinkedIn Engineering (1)


fasterthanli.me (1)


Computer Things (1)


Blog on Tailscale (1)


PlanetScale - Blog (2)


Towards Data Science - Medium (2)


Weaveworks (2)


The CircleCI Blog Feed - CircleCI (2)


The Pragmatic Engineer (2)


Retool blog (2)


Pluralistic: Daily links from Cory Doctorow (2)


frankdenneman.nl (2)


Google AI Blog (2)


The Ably Blog (2)


Irrational Exuberance (2)


Eli Bendersky's website (2)


The Go Blog (2)


The Teleport Blog (2)


Engineering at Meta (3)


Sentry Blog RSS (3)


Blog – Hackaday (3)


Microsoft Security Blog (4)


The Cloudflare Blog (4)


Amazon Science homepage (4)


The Full Feed - All of the Packet Pushers Podcasts (5)


Changelog Master Feed (6)


Stack Overflow Blog (8)


Simon Willison's Weblog: Blogmarks (11)


Cloud Blog (15)


https://kk.org/thetechnium

"Laptop landlords" is a zippy coinage for coastal people investing into cheap property in the heartland via online services. It's only a few percent of total real estate sales, but it might affect prices. https://t.co/Dyb4SWQ1Gu — Kevin Kelly (@kevin2kelly) August 29, 2022 "Cooking fanfiction" is another cultural phenom that I could have never predicted. Chefs who are into cooking dishes from their favorite fiction. https://t.co/gOBMY0w0Yt — Kevin Kelly (@kevin2kelly) August 29, 2022 (BACK TO TOP)

https://eugeneyan.com

Or why I should write fewer integration tests. (BACK TO TOP)

https://stratechery.com

Apple introduced some impressive product updates; the real news, though, were the prices, which suggested that Apple is fully embracing being a services company. (BACK TO TOP)

https://krebsonsecurity.com

A 21-year-old New Jersey man has been arrested and charged with stalking in connection with a federal investigation into groups of cybercriminals who are settling scores by hiring people to carry out physical attacks on their rivals. Prosecutors say the defendant recently participated in several of these schemes -- including firing a handgun into a Pennsylvania home and torching a residence in another part of the state with a Molotov Cocktail. (BACK TO TOP)

https://hacks.mozilla.org/

In June 2021, we decided to start converting the source code for MDN web docs from HTML into a format that would be easier for us to work with. The goal was to get 100% of our manually-written documentation converted to Markdown, and we really had a mountain of source code to climb for this particular expedition. In this post, we’ll describe why we decided to migrate to Markdown, and the steps you can take that will help us on our mission. (BACK TO TOP)

https://slack.engineering

Slack, as a product, presents many opportunities for recommendation, where we can make suggestions to simplify the user experience and make it more delightful. Each one seems like a terrific use case for machine learning, but it isn’t realistic for us to create a bespoke solution for each. Instead, we developed a unified framework we […] The post Recommend API appeared first on Slack Engineering . (BACK TO TOP)

https://berthub.eu/articles/

In the world of Global Navigation Satellite Systems (GNSS), change tends to happen very slowly and cautiously. It is therefore quite exciting how many new features Galileo, the “European GPS” has been rolling out lately. Earlier I wrote a little bit about the High Accuracy Service (HAS), whereby the Galileo satellites themselves provide properly equipped receivers (not your phone) with near-realtime updates that can be used to achieve very good accuracy. (BACK TO TOP)

https://geohot.github.io//blog/

Before asking the question, how do I build AGI, you first must ask the question, what would I recognize as AGI? I suspect there’s not a “real” answer for this. Humans can be fooled both ways, into thinking simple things have “intelligence” and “life”, and into thinking complex things don’t. Though they usually aren’t fooled for too long, at least with the simple things. I define AGI as a machine capable of taking (almost) any human job . This says a few things about what it must be like.ai . (BACK TO TOP)

/

In Rust, how does using a different primitive type (u8, i32, u64, …) change the generated assembly? (BACK TO TOP)

https://programmingdigest.net

sponsor The open source Product OS. Built on the modern data stack. PostHog's open source platform has everything engineering teams need in one place. Product Analytics, Session Recording, Funnels, Feature Flags, Experimentation and more — all seamlessly integrated. And you can self-host, so user data never leaves your infrastructure. Git's database internals This blog series will examine Git’s internals to help make your engineering system more efficient. Skip the waitlist and signup. (BACK TO TOP)

http://jvns.ca/atom.xml

Hello! Recently I’ve been working on a project where I implement a bunch of tiny toy working versions of computer networking protocols in Python without using any libraries, as a way to explain how computer networking works. I’m still working on writing up that project, but today I wanted to talk about how to do the very first step: sending network packets in Python.com . All the code from this post is in this gist . what’s a network packet? A network packet is a byte string.com example.0.2.2.0. (BACK TO TOP)

https://www.timescale.com/blog/

Time-series forecasting allows us to analyze data we stored in the past to make informed decisions about the future. In this blog post, we go into detail about what time-series forecasting is, its applications, and its most popular techniques. (BACK TO TOP)

https://www.tbray.org/ongoing/ongoing.atom

(BACK TO TOP)

https://tech.fb.com/

At Meta, we move fast. It’s been a guiding principle for us for many years — one that has empowered us to be bold, innovative, and proactive with opportunities that might otherwise die on the vine.  When the pandemic hit, this core value was tested in ways we could never have imagined. Our long-standing culture […] The post How Meta is building a unified company culture in a hybrid workplace appeared first on Tech at Meta . (BACK TO TOP)

https://engineering.linkedin.com/blog.rss.html

Originally from Argentina, systems & infrastructure engineering leader Federico was a founding member of the Media Infrastructure team in 2015. Now based in Bellevue, Wash., Federico shares how his supportive mentor, LinkedIn’s “sweet spot” scale, and the distinctive engineering challenges here ultimately brought him back to LinkedIn in 2019. My love for engineering started in my home country of Argentina. I loved the interesting problems I […] (BACK TO TOP)

https://fasterthanli.me/index.xml

(BACK TO TOP)

https://buttondown.email/hillelwayne

New Post: Safety and Liveness Properties Just a few useful ideas from the formal methods world. Read it here ! Data Invariants Let’s stay on theme this week with a quick overview of data invariants. These are statements about the data that determine correctness: an invariant can only be broken if there’s a bug in your program. One I had to implement recently was an open-ended interval. A start integer could be defined, or an end integer, or both. Or, formally 1. Null(start) => !Null(end) 2. (BACK TO TOP)

https://tailscale.com/blog/

Good news everyone: Tailscale is SOC 2 compliant! Wait… weren’t we already compliant ? Yes, but now we’re SOC 2 Type II compliant… which is kind of a big deal. As part of our ongoing commitment to security and privacy at Tailscale, we’ve completed a SOC 2 Type II audit . Our Type I audit validated that we had policies and procedures in place to keep your information safe. Our SOC 2 Type I audit (i.e. Our SOC 2 Type II report verifies that we’re actually following these policies and procedures.g. (BACK TO TOP)

https://planetscale.com

Learn how we used TAOBench with PlanetScale to benchmark social media workloads Read the full story (BACK TO TOP)

We just introduced a new feature, Gated Deployments, that gives you more control over when your schema changes deploy. Read the full story (BACK TO TOP)

https://towardsdatascience.com

Practical Examples to Master SQL CASE-WHEN statement. Continue reading on Towards Data Science » (BACK TO TOP)

Analyze social media performance with Bayesian vs. Frequentist statistics Continue reading on Towards Data Science » (BACK TO TOP)

https://www.weave.works/

GitOps has already established itself as the most promising standard for Continuous Delivery. It assumes Git as a single source of truth and enables developers to define applications and infrastructures declaratively, automating most workflows. Being a fairly new and nascent idea in the world of software delivery, GitOps is constantly evolving. Here are some of the main ideas that are shaping GitOps today. In this article, we outline the 6 key ideas shaping GitOps. 1. 2. 3. 4. 5. 6. (BACK TO TOP)

The cloud-native ecosystem has steadily grown over the past decade with the promise of faster deployments, cost-efficient infrastructure, and auto-scalability spurring its growth. Businesses are now developing and deploying easily scalable, cost-efficient, and more resilient applications, thus delivering innovative solutions faster and more efficiently. Yet the more frequent deployments present a problem: smaller windows of opportunity to find and fix security vulnerabilities. (BACK TO TOP)

https://circleci.com/blog/

This tutorial covers: Dockerizing a sample Laravel app Creating a continuous deployment configuration to build and deploy the container image Deploying the Laravel app to the Azure Container Registry As web applications become more complex, software engineering teams must rely on many different products and services to create the best developer experience. The application development ecosystem has grown beyond version control and hosting deployment. It also introduces the risk of human error.0. (BACK TO TOP)

This tutorial covers: Building a sample React app Setting up and configuring the application on Firebase Creating a continuous deployment pipeline Many platforms offer free hosting services for React and other JavaScript frameworks. These frameworks can be used for building single-page applications, which is handy when you need to launch a minimum viable product or a quick proof of concept. Your fellow developers are taking advantage of these tools, and you can too.js installed on your system.4. (BACK TO TOP)

https://blog.pragmaticengineer.com/

Snap suddenly decided to shut Zenly down: an app with 40M monthly active users, growing fast. What happened, and what can other acquisitions learn from the fate of Zenly? (BACK TO TOP)

The end of Netflix’s 25-year policy of one level for all software engineers. What are these levels, and how do people feel about the change? (BACK TO TOP)

https://retool.com/blog/

The sales team at Retool operates on a suite of Retool apps built on top of Salesforce data. Learn how we save each rep and leader hours of tedious work each week with custom apps. (BACK TO TOP)

This is a guest post series by Cameron Archer, Content Marketing Lead at Tinybird , a serverless analytical backend that lets developers quickly build low-latency APIs on top of large and complex datasets. Check out Part 1 . This is the second post in a series of articles that explains how I& (BACK TO TOP)

https://pluralistic.net

Today's links Every billionaire is a factory for producing policy failures: On the "attack philanthropy" of Barre Seid. The horrifying tale of a blockchain-based virtual sweatshop: "Anda's Game" was a warning, not a suggestion. Hey look at this: Delights to delectate." It's part of a long American tradition that abhors the gathering of power into just a few hands. Some Americans call this "liberty. The fight to prevent the rise of a new aristocracy has never ended in America." https://marker.co. (BACK TO TOP)

Today's links How Audible steals from creators (an Audible exclusive): The only part of "Chokepoint Capitalism" available on Audible. Hey look at this: Delights to delectate. But my books aren't for sale there, even though that means foregoing the majority of the market. I explain why in a chapter of "Chokepoint Capitalism," my forthcoming book, co-authored with Rebecca Giblin. You can't just give them a tool to convert Audible files to MP3s or even another DRM format.medium. https://twitter.co. (BACK TO TOP)

https://frankdenneman.nl/

This week we released two episodes covering the vSphere 8 and vSan 8 releases. Together with Feidhlim O’Leary, we discover all the new functions and features of the vSphere 8 platform. You can listen to this episode on Spotify, Apple, or on our website: unexploredterritory.tech Pete Koehler repeats his stellar performance of last time and […] The post vSphere 8 and vSan 8 Unexplored Territory Podcast Double Header appeared first on frankdenneman.nl . (BACK TO TOP)

This week Duncan and I attended VMware Explore to co-present the session “60 Minutes of Virtually Speaking Live: Accelerating Cloud Transformation.” with William Lam and our buddies of the Virtually Speaking Podcast, Pete Flecha and John Nicholson.  The recordings should be made available soon or sign up for the session in Barcelona. During the week, we […] The post Unexplored Territory – VMware Explore USA Special appeared first on frankdenneman.nl . (BACK TO TOP)

http://ai.googleblog.com/

Posted by Zhengzhong Tu and Yinxiao Li, Software Engineers, Google Research Convolutional neural networks have been the dominant machine learning architecture for computer vision since the introduction of AlexNet in 2012. Recently, inspired by the evolution of Transformers in natural language processing , attention mechanisms have been prominently incorporated into vision models. ViT regards image patches as a sequence of words, and applies a Transformer encoder on top.5% with 475M parameters. (BACK TO TOP)

Posted by Richard C. Gerkin, Google Research, and Alexander B. Wiltschko, Google Did you ever try to measure a smell? …Until you can measure their likenesses and differences you can have no science of odor. If you are ambitious to found a new science, measure a smell. — Alexander Graham Bell, 1914. How can we measure a smell? Smells are produced by molecules that waft through the air, enter our noses, and bind to sensory receptors. Sensory maps can help us solve this problem.g.g.e. sick.g. (BACK TO TOP)

https://ably.com/

Easily add live features to your Ably applications with our simple to use APIs. (BACK TO TOP)

How to build a basic serverless WebSockets platform with AWS API Gateway & AWS Lambda. (BACK TO TOP)

https://lethain.com/

Often when an organization is going through some turmoil, executives think to themselves, “Ah, I should have some one-on-ones with the team so they can hear how we’re handling this. General Advice Before surveying the taxonomy of executive one-on-ones, some high-level advice: If you’re not sure what’s happening, let the executive take the lead Try to figure out why the meeting is happening before you’re in the meeting. There may be significant conflict with an organization. (BACK TO TOP)

I get to lead a monthly session with Calm’s staff engineers. Some months that is mostly a Q&A, but I find the best sessions have at least some component of directed learning. For example, we recently did a session on presenting to executives , which we used to dig into a decision I’d just made that had frustrated several folks in the session. I thought this would be an interesting exercise to run as a group, with each of us taking ten minutes to create our own three maps, then sharing them out. (BACK TO TOP)

https://eli.thegreenplace.net/

Over the summer my family has experienced a brief renaissance of interest in Sudoku, particularly as I've tried to get my kids to practice solving some non-trivial puzzles (pro tip: YouTube videos help). Sudoku puzzle sample Naturally, whenever a programmer encounters Sudoku it's hard to avoid thinking about automated solvers. In fact, I've already written a Sudoku solver many years ago ; it converts the puzzle into a SAT problem and solves that using a standard SAT solver.g. YMMV.0 (hardest). (BACK TO TOP)

A common question that comes up when writing AST-based tooling in Go is "how do I find a node's parent?", or more generally, "what are all the ancestors of a given node?" Go's AST package does not come with parent links out of the box; this is a common choice in AST libraries [1] . Parent links are rarely needed, but they carry significant overheads in terms of memory usage and CPU time. Typical AST nodes can be fairly compact and adding a pointer to each node can increase its size considerably. (BACK TO TOP)

https://go.dev/blog/feed.atom

The Go Blog Go Developer Survey 2022 Q2 Results Todd Kulesza 8 September 2022 .chart { margin-left: 1.5rem; margin-right: 1.5rem; width: 800px; } .quote { margin-left: 2rem; margin-right: 2rem; color: #999; font-style: italic; font-size: 120%; } @media (prefers-color-scheme: dark) { .chart { border-radius: 8px; } } Overview This article shares the results of the 2022 June edition of the Go Developer Survey.18, including generics, security tooling, and workspaces.e.18 release.18 packages (26%).e. (BACK TO TOP)

The Go Blog Vulnerability Management for Go Julie Qiu, for the Go security team 6 September 2022 We are excited to announce Go’s new support for vulnerability management, our first step towards helping Go developers learn about known vulnerabilities that may affect them. This post provides an overview of what’s available today and next steps for this project. Overview Go provides tooling to analyze your codebase and surface known vulnerabilities.go.go.dev/vuln .dev/security/vuln/database ./... (BACK TO TOP)

https://goteleport.com/blog/

Exploring techniques and best practices to manage HTTP sessions. (BACK TO TOP)

An overview of Teleport 10, deeper dive into Teleport Connect for Windows and Directory Sharing to Teleport Desktop Access. (BACK TO TOP)

https://engineering.fb.com/

What the research is: The continued emergence of large social network applications has introduced a scale of data and query volume that challenges the limits of existing data stores. However, few benchmarks accurately simulate these request patterns, leaving researchers in short supply of tools to evaluate and improve upon these systems.  To address this issue, [...] Read More... The post Open-sourcing TAOBench: An end-to-end social network benchmark appeared first on Engineering at Meta . (BACK TO TOP)

Meta’s overall network usage and traffic volume has increased as we’ve continued to add new services. Due to the scarcity of fiber resources, we’re developing an explicit resource reservation framework to effectively plan, manage, and operate the shared consumption of network bandwidth, which will help us keep up with demand and limit network disruptions during [...] Read More... The post Network Entitlement: A contract-based network sharing solution appeared first on Engineering at Meta . (BACK TO TOP)

Meta currently operates 14 data centers around the world. This rapidly expanding global data center footprint poses new challenges for service owners and for our infrastructure management systems. Systems like Twine, which we use to scale cluster management, and RAS, which handles perpetual region-wide resource allocation, have provided the abstractions and automation necessary for service [...] Read More... (BACK TO TOP)

https://blog.sentry.io

We’re joining form and function with Release Health widgets and a new release filter in Dashboards. Whether you want to focus on your latest release or compare adoption and stability across releases, you can build and filter dashboards to tell you exactly how they are trending. (BACK TO TOP)

*The Sentry Terraform Provider is an open-source project built and maintained by a community developer and officially sponsored by Sentry… (BACK TO TOP)

Toolchains are complicated these days - developers and engineering managers are working with more tools than they probably care to count. In… (BACK TO TOP)

https://hackaday.com

We’ve all been there. Something that is known to work doesn’t work out in the field. But back at home base, it works fine. How do you fix it? Of …read more (BACK TO TOP)

Moore’s law might not be as immutable as we once though thought it was, as chip makers struggle to fit more and more transistors on a given area of silicon. …read more (BACK TO TOP)

When thinking about forests being endangered by human activity, most people would immediately think of the rainforest. Below the ocean surface, there’s another type of forest is in danger: the …read more (BACK TO TOP)

https://www.microsoft.com/security/blog/

At Microsoft, we define threat hunting as the practice of actively looking for cyberthreats that have covertly (or not so covertly) penetrated an environment. This involves looking beyond the known alerts or malicious threats to discover new potential threats and vulnerabilities. The post The art and science behind Microsoft threat hunting: Part 1 appeared first on Microsoft Security Blog . (BACK TO TOP)

Shortly after the destructive cyberattacks on the Albanian government in mid-July, the Microsoft Detection and Response Team (DART) was engaged to lead an investigation into the attacks. The post Microsoft investigates Iranian attacks against the Albanian government appeared first on Microsoft Security Blog . (BACK TO TOP)

Microsoft threat intelligence teams have been tracking multiple ransomware campaigns tied to DEV-0270, also known as Nemesis Kitten, a sub-group of Iranian actor PHOSPHORUS. The post Profiling DEV-0270: PHOSPHORUS’ ransomware operations appeared first on Microsoft Security Blog . (BACK TO TOP)

Balaji Parimi, Partner General Manager of Permissions Management in the Identity and Network Access Division at Microsoft, discusses what his startup background brings to his work in identity and access management. The post One Microsoft manager’s entrepreneurial vision for multicloud identity and access appeared first on Microsoft Security Blog . (BACK TO TOP)

https://blog.cloudflare.com/

Gartner has recognised Cloudflare as a Leader in the 2022 "Gartner® Magic Quadrant™ for Web Application and API Protection (WAAP)" report that evaluated 11 vendors for their ‘ability to execute’ and ‘completeness of vision’ (BACK TO TOP)

Data Generation and Augmentation methods to train an effective machine learning WAF (BACK TO TOP)

We have blocked Kiwifarms. Visitors to any of the Kiwifarms sites that use any of Cloudflare's services will see a Cloudflare block page and a link to this post. (BACK TO TOP)

When a request at Cloudflare throws an error, information gets logged in our requests_error pipeline. The error logs are used to help troubleshoot customer-specific or network-wide issues (BACK TO TOP)

https://www.amazon.science/

New auto-scheduler speeds optimization process sixfold while improving performance of resulting code up to 70%. (BACK TO TOP)

Preliminary tests show a prototype pinch-grasping robot achieved a 10-fold reduction in damage on items such as books and boxes. (BACK TO TOP)

Speech recognition and text-to-speech predominate, but other topics include audio watermarking, automatic dubbing, and compression. (BACK TO TOP)

Method would enable customers to evaluate supporting evidence for tip reliability. (BACK TO TOP)

https://packetpushers.net

In this episode of the IPv6 Buzz podcast, Ed, Scott, and Tom talk about microsegmentation with IPv6 and what the IT use cases look like. The post IPv6 Buzz 109: Microsegmentation With IPv6 appeared first on Packet Pushers . (BACK TO TOP)

In this Day Two Cloud episode, Ned and Ethan discuss the tradeoffs of mental health and professional achievement. Maybe you spend a lot of extra hours at work for your employer. Perhaps you focus on certifications after work and on the weekends. Maybe you say “yes” to more than you should, because you’re scared you’ll lose it all if you don’t. The tradeoffs are in your personal relationships. Your mental health. You suffer from burnout, anxiety, and stress. (BACK TO TOP)

Today on the Tech Bytes podcast we talk with sponsor Nokia about its SR Linux network OS. More specifically, because SR Linux is open, customers can write homegrown applications to solve specific problems with the network OS using Nokia's NetOps Development Kit (NDK). The post Tech Bytes: Develop Custom Network Apps With Nokia’s SR Linux NDK (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

This week's Network Break podcast tackles space weather, new products from VMware, a significant firewall vulnerability, an order barring NVIDIA from selling certain chips to China, and more tech news. The post Network Break 397: VMware Aria Sings Multicloud Management; NVIDIA Ordered To Stop Selling AI Chips To China appeared first on Packet Pushers . (BACK TO TOP)

On today’s episode of Heavy Networking, we discuss secure wireless planning and design with Jennifer "JJ Minella. JJ is the author of the book "Wireless Security Architecture." We talk about the goals for planning a wireless design, why it's worth the upfront investment, keeping operators in mind as you design your deployment, the importance of communication, design iteration, and more. The post Heavy Networking 645: Secure Wireless Planning And Design appeared first on Packet Pushers . (BACK TO TOP)

https://changelog.com/master

Egon Elbre and Roger Peppe join Mat for a conversation all about bloat (and how to avoid it). Expect talk of code bloat, binary bloat, feature bloat, and an even-more-bloated-than-usual unpopular opinion segment. (BACK TO TOP)

Maybe it’s the Californian sun. Or perhaps it’s the time spent at Disney Studios, the home of the best stories. One thing is for sure: Taylor Dolezal is one of the happiest cloud native people that Gerhard knows. As a former Lead SRE for Disney Studios, Taylor has significant hands-on experience running cloud native technologies in a large company. After a few years as a HashiCorp Developer Advocate, Taylor is now Head of End User Ecosystem at CNCF. (BACK TO TOP)

AI is increasingly being applied in creative and artistic ways, especially with recent tools integrating models like Stable Diffusion. This is making some artists mad. How should we be thinking about these trends more generally, and how can we as practitioners release and license models anticipating human impacts? We explore this along with other topics (like AI models detecting swimming pools 😊) in this fully connected episode. (BACK TO TOP)

Martin Heinz thinks you should be using Python’s walrus operator, you probably believe some falsehoods about email, Carlos Fenollosa threw in the towel after self-hosting his email for 23 years & Leon is an open source personal assistant that can live on your server. (BACK TO TOP)

This week we’re sharing the most popular episode of Go Time from last year — Go Time #196. We believe this episode was the most popular because it’s all about building actually maintainable software and what goes into that. Kris Brandow is joined by Johnny Boursiquot, Ian Lopshire, and Sam Boyer. There’s lots of hot takes, disagreements, and unpopular opinions. This is part two of a three part mini-series led by Kris on maintenance. (BACK TO TOP)

Dr. Gleb Bahmutov returns to the party for a wide-ranging discussion on open source, end-to-end testing, Cypress, and more. Amal, Divya & Chris host. (BACK TO TOP)

https://stackoverflow.blog

That Perl interpreter you have on your Linux machine? Update it and check out the present. The post This is not your grandfather’s Perl appeared first on Stack Overflow Blog . (BACK TO TOP)

Developers and their employers are constantly thinking about productivity. We partnered with Logitech to produce a four-part podcast series to chat about how your hardware and software work together to keep you in a flow state and make you more productive. Each podcast will have it’s own landing page on the blog, but will also… The post For developers, flow state starts with your finger tips  appeared first on Stack Overflow Blog . (BACK TO TOP)

Episode one of our four-part series sponsored by Logitech. The post Flow state at your fingertips: How keyboards impact developer productivity (Ep. 481) appeared first on Stack Overflow Blog . (BACK TO TOP)

Curation at scale needs to process a lot of data with a good algorithm. The post How machine learning algorithms figure out what you should watch next appeared first on Stack Overflow Blog . (BACK TO TOP)

Learn how developers, technologists, and forward thinking organizations are adapting to the new normal. The post Work has changed. Our upcoming conference, Flow State, explores what’s next appeared first on Stack Overflow Blog . (BACK TO TOP)

Will students learn the the fundamentals if they can just TAB their way to a function? The post Does AI-assisted coding make it too easy for students to cheat on schoolwork? (Ep. 480) appeared first on Stack Overflow Blog . (BACK TO TOP)

AI goes on prem, university cheating at scale, and why React re-renders The post The Overflow #141: High-velocity and burnout appeared first on Stack Overflow Blog . (BACK TO TOP)

Tommy McClung, cofounder and CEO of ReleaseHub, sits down with the home team to talk about environments-as-a-service, what it’s like to work with the same cofounders for more than 20 years, and the role of karma in professional networking. The post Environments on-demand (Ep. 479) appeared first on Stack Overflow Blog . (BACK TO TOP)

http://simonwillison.net/

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

https://cloud.google.com/blog/

Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more.  Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here:  Google Cloud blog 101: Full list of topics, links, and resources . Watch all the sessions on demand or read the full recap . See Transfer from S3-compatible sources for details.23.6-gke. Learn more .39. Learn more . (BACK TO TOP)

Business leaders and IT professionals come to Google Workspace to build secure, cloud-first collaboration solutions that transform how people work together. Here’s the latest from Google Workspace leaders and partners about the evolving future of work and collaboration, all in one place. Read the article . Read the article . Read the article . Read more . Insights from our global hybrid work survey Google Workspace commissioned Economist Impact to conduct a global hybrid work survey. (BACK TO TOP)

As we talk to customers large and small, we are seeing more and more “data-rich” workloads moving to the cloud. Customers are collecting more valuable data than ever before, and they want that data from different sources to be centralized and normalized before running analytics on it. Storage is becoming the common substrate for enabling higher-value services like data lakes, modeling and simulation, big data, and AI and machine learning.99% regional storage availability SLA.g. 1... Read Article (BACK TO TOP)

Backup is a fundamental aspect of application protection. As such, the need for a seamlessly integrated, centralized backup service is vital when seeking to ensure resilience and recoverability for data generated by Google Cloud services or on-premises infrastructure.  Regardless of whether the need to restore data is triggered by a user error, malicious activity, or some other reason, the ability to execute reliable, fast recovery from backups is a critical aspect of a resilient infrastructure. (BACK TO TOP)

While businesses can’t expect the unexpected, they can prepare for it. Events of the last few years have proven that circumstances can change at any time, with little warning. But flexible, dynamic culture and tools are one way that organizations can stay on course through unsteady waters. And one way to achieve dynamic flexibility is through composable business practices. Picture your business as a collection of different components, like interlocking structures made of small building blocks. (BACK TO TOP)

Editor’s note : Learn how mobile app experience company Airship uses Cloud Bigtable to deliver high performance throughput and speed, while freeing app developers to focus on high-value feature development. Airship is a company that helps marketers, product owners, and developers create and adapt powerful mobile app experiences. Yet some brands treat their mobile apps as just another promotional channel. They’re driving customers to the app but not holding onto them. Related Article Read Article (BACK TO TOP)

An essential aspect of operating any application is the ability to observe the health and performance of that application and of the underlying infrastructure to quickly resolve issues as they arise. Google Kubernetes Engine (GKE) already provides audit logs , operational logs , and metrics along with out-of-the-box dashboards and automatic error reporting to facilitate running reliable applications at scale.wagtailcore.rich_text. Get started GKE clusters running control plane version 1.23. (BACK TO TOP)

Google Cloud allows you to move your PostgreSQL databases to Cloud SQL with Database Migration Service (DMS) . DMS gives you the ability to replicate data continuously to the destination database, while the source is live in production, enabling you to migrate with minimum downtime. However, terabyte-scale migrations can be complex. For instance, if your PostgreSQL database has Large Objects , then you will require some downtime to migrate them manually as that is a limitation of DMS. (BACK TO TOP)

If you work in compliance, privacy, or risk, you know that regulatory developments have continued to accelerate this year. As part of our commitment to be the most trusted cloud, we continue to pursue global industry standards, frameworks, and codes of conduct that tackle our customers’ foundational need for a documented baseline of addressable requirements.  We have seen key updates across all regions and have worked to help organizations address these new and evolving requirements.  Updated U. (BACK TO TOP)

BigQuery is a leading data warehouse solution in the market today, and is valued by customers who need to gather insights and advanced analytics on their data. Many common BigQuery use cases involve the storage and processing of Personal Identifiable Information (PII)—data that needs to be protected within Google Cloud from unauthorized and malicious access. Too often, the process of finding and identifying PII in BigQuery data relies on manual PII discovery and duplication of that data... (BACK TO TOP)

Dataflow is the industry-leading unified platform offering batch and stream processing. It is a fully managed service that comes with flexible development options (from Flex Templates & Notebooks to Apache Beam SDKs for Java, Python and Go) and a rich set of built-in management tools. While our customers value these capabilities, they continue to push us to innovate and provide more value as the best batch and streaming data processing service to meet their ever-changing business needs. Fig 1. (BACK TO TOP)

Integrating your ArgoCD deployment with Connect Gateway and Workload Identity provides a seamless path to deploy to Kubernetes on many platforms. ArgoCD can easily be configured to centrally manage various cluster platforms including GKE clusters, Anthos clusters, and many more. This promotes consistency across your fleet, saves time in onboarding a new cluster, and simplifies your distributed RBAC model for management connectivity. Skip to steps below to configure ArgoCD for your use case.g.g. (BACK TO TOP)

One thing I love about cloud is that it’s possible to succeed as a cloud engineer from all kinds of different starting points. It’s not necessarily easy; our industry remains biased toward hiring people who check a certain set of boxes such as having a university computer science degree. We recorded our answers in a video series called Cracking the Google Cloud Career that you can watch on the Google Cloud Tech YouTube channel.  First, consider getting certified. (BACK TO TOP)

When developing services with Compute Engine , our customizable compute service that lets you create and run virtual machines on Google’s infrastructure, you’ll likely find yourself frequently switching between your code editor, terminal, and the Google Cloud Console. Cloud Code is a set of IDE plugins for popular IDEs like VS Code and IntelliJ that make it easier to develop applications that use Google Cloud services. From there, you can see all the VMs in your current Cloud project. (BACK TO TOP)

Data governance includes people, processes, and technology. Together, these principles enable organizations to validate and manage across dimensions such as: Data management, including data and pipelines lifecycle management and master data management. Data protection, spanning data access management, data masking and encryption, along with audit and compliance.   Data discoverability, including data cataloging, data quality assurance, and data lineage registration and administration. 1. 2. 3. (BACK TO TOP)

Bulletin by Jakub Mikians