Bulletin for Friday, 27 Jan 2023
7 days digest
Sentry Blog RSS (1)
Computer Things (1)
OpenAI (1)
Metadata (1)
Tech Notes (1)
McKinsey Digital Insights - Medium (1)
Schibsted engineering - Medium (1)
Think Fast, Talk Smart: Communication Techniques (1)
Stratechery by Ben Thompson (1)
Eugene Yan (1)
allegro.tech (1)
Patterns Blog (1)
Weaveworks (1)
Vallified (1)
Maximum Effort, Minimum Reward (1)
dropbox.tech (1)
Earthly Blog (2)
- How to Set Up a TypeScript Monorepo
- Introduction to the Context Managers and the
with
Keyword in Python?
Timescale Blog (2)
- How TimescaleDB Solves Common PostgreSQL Problems in Database Operations With Data Retention Management
- Timescale Timeout: The History and Basics of PostgreSQL
(Part I)
- Teaching virtual robots to follow natural-language instructions
- Using large language models (LLMs) to synthesize training data
Notes on software development (2)
- An effective product manager
- Live coding a Scheme-like language in Go, part 3: AST walking interpreter
Almost Secure (2)
Go (Golang) Programming Blog - Ardan Labs on (2)
Replit Blog (2)
- Unifying Messaging Experiences across LinkedIn
- Improving the customer’s experience via ML-driven payment routing
- Reverse-engineering the Intel 8086 processor's HALT circuits
- Reverse-engineering the conditional jump circuitry in the 8086 processor
- Inside the Globus INK: a mechanical navigation computer for Soviet spaceflight
- Supporting OAuth in the Tailscale API
- Tailscale actions for iOS and macOS Shortcuts
- Traefik Proxy now offers Tailscale as certificate resolver
- Experian Glitch Exposing Credit Files Lasted 47 Days
- Administrator of RSOCKS Proxy Botnet Pleads Guilty
- New T-Mobile Breach Affects 37 Million Accounts
Google AI Blog (3)
- Learning with queried hints
- Deciphering clinical abbreviations with privacy protecting ML
- Google Research, 2022 & beyond: Responsible AI
DTN (3)
- One Byte at a Time: Agronomy Data Insights and Elephants
- Capture producer insight with FarmMarket data
- DTN announces launch of WeatherFactor API to enhance pre-voyage planning
Pluralistic: Daily links from Cory Doctorow (4)
- Pluralistic: The public paid for "Moderna's" vaccine, and now we're going to pay again (and again and again); How Facebook's Real Names policy helps Cambodia's thin-skinned dictator terrorize dissenters (25 Jan 2023)
- Pluralistic: David Graeber's "Pirate Enlightenment" (24 Jan 2023)
- Pluralistic: Eggflation is just more price-gouging (23 Jan 2023)
- Pluralistic: Tiktok's enshittification (21 Jan 2023)
Blog – Hackaday (4)
- Casting Custom Resin Buttons for the Steam Deck
- ADS-B Exchange Sells Up, Contributors Unhappy
- All About USB-C: Framework Laptop
- Exploring the Hall Effect for Haptic Feedback PS4 Joysticks
The Full Feed - All of the Packet Pushers Podcasts (4)
- IPv6 Buzz 118: IPv6 Training At RIPE NCC
- Day Two Cloud 179: Will CXL Make Composable Infrastructure Real?
- Network Break 414: 230 Juniper Vulnerabilities, Should Cisco Patch An EOL Router, T-Mobile Takes Weeks To Spot Breach
- Heavy Networking 662: Home Lab In The Cloud Or Your Basement?
- 2023 identity security trends and solutions from Microsoft
- Introducing kernel sanitizers on Microsoft platforms
- Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results
- Microsoft Security innovations from 2022 to help you create a safer world today
- Digital event highlights new features in Microsoft Purview
- Comparing tag trends with our Most Loved programming languages
- How chaos engineering preps developers for the ultimate game day (Ep. 531)
- AI applications open new security vulnerabilities
- From your lips to AI’s ears (Ep. 530)
- How to build a universal computation machine with Tetris (Ep. 529)
- The Overflow #161: Git isn’t the only game in town
- Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite
- Investing in security to protect data privacy
- Armed to Boot: an enhancement to Arm's Secure Boot chain
- Cloudflare incident on January 24, 2023
- Intelligent, automatic restarts for unhealthy Kafka consumers
- Internet disruptions overview for Q4 2022
- Why we switched to serverless containers (Ship It! #87)
- GPU dev environments that just work (Practical AI #208)
- What's new in Astro 2 (JS Party #260)
- Prioritizing tech debt, UI components to copy/paste, learnings from 20 years in software, git-sim & jqjq (Changelog News)
- Just Postgres (The Changelog #523)
- How do you define joy? (JS Party #259)
- Human scale deployments (Ship It! #86)
Simon Willison's Weblog: Blogmarks (10)
- Guppe Groups
- Python Sandbox in Web Assembly
- Jortage Communal Cloud
- Wildebeest
- Inside the Globus INK: a mechanical navigation computer for Soviet spaceflight
- The Page With No Code
- OpenAI Cookbook: Techniques to improve reliability
- datasette-granian
- Hctree Design Documentation
- Hctree: an experimental high-concurrency database backend for SQLite
Towards Data Science - Medium (10)
- How to Compare Two Tables For Equality in BigQuery
- 4 Useful BigQuery SQL Functions You May Not Know
- Building a Data Lake on PB scale with Apache Spark
- How I Set Up Data Science Projects (with VS Code and DVC)
- Time Series Transformations (and Reverting) Made Easy
- Audio Data Takes Center Stage
- Streaming Big Data Files from Cloud Storage
- Tree Ensembles: Bagging, Boosting and Gradient Boosting
- How to Do Language Detection Using Python, NLTK, and Some Easy Statistics
- Why Simple Models Are Often Better
Cloud Blog (20)
- These retailers have one thing in common
- Better together: Looker connector for Looker Studio now generally available
- How The Home Depot gets a single pane of glass for metrics across 2,200 stores
- Introducing Spresso: A new solution to balance profit and conversion
- How innovative startups are growing their businesses on Google’s open data cloud
- Manage Kubernetes configuration at scale using the new GitOps observability dashboard
- How to get started with the Political Ads Transparency Report dataset
- What’s new with Google Cloud
- Looking back at Retail’s Big Show: Google at NRF 2023
- L’Oreal enables a global developer workforce with secure cloud development environments
- How Confidential Space and multi-party computation can help manage digital assets more securely and efficiently
- Transforming customer experiences with modern cloud database capabilities
- How to plan your SQL Server migration to Cloud SQL
- Scaling machine learning inference with NVIDIA TensorRT and Google Dataflow
- Native image compilation - what’s new, and what’s next?
- Apply policy bundles and monitor policy compliance at scale for Kubernetes clusters
- Accessing Cloud SQL using Private Service Connect
- A new Google Cloud region is coming to Kuwait
- Vertex AI Foundations for secure and compliant ML/AI deployment
- Answering the Top-25 most asked Google Cloud questions of 2022
Bugs are one of the most troubling aspects of software development; they appear out of nowhere and cause everything to stop working. Most of… (BACK TO TOP)
https://buttondown.email/hillelwayne
Lots of admin stuff today! First, we have a new blogpost , the full version of the complexity preview I shared last week. I’m also announcing a new TLA+ workshop ! Or more precisely, three workshops. To make it easier on people’s schedules, there are three dates you can sign up for: March 20, May 15, and June 12. And there’s no fee to move between classes if something comes up and you can’t make your session. Use the code C0MPUT3RTHINGS for 15% off. . 1 Anyway, on to the main thing... Joy. ↩ (BACK TO TOP)
We're happy to announce that OpenAI and Microsoft are extending our partnership. This multi-year, multi-billion dollar investment from Microsoft follows their previous investments in 2019 and 2021, and will allow us to continue our independent research and develop AI that is increasingly safe, useful, and powerful. In pursuit (BACK TO TOP)
http://muratbuffalo.blogspot.com/
This paper appeared in CIDR 2023 recently. It is a thought provoking big picture paper, coming from a great team. The paper draws attention to the divide between conventional wisdom on building scalable OLTP databases (shared-nothing architecture) and how they are built and deployed on the cloud (shared storage architecture). The paper doesn't analyze this divide in detail, and jumps off to discuss shared storage with multiple writer as a more scalable way to build cloud OLTP databases.e. (BACK TO TOP)
#506 – January 23, 2023 1500 Archers on a 28.8: Network Programming in Age of Empires and Beyond In Age of Empires the time to complete each simulation step varies greatly: the rendering time changes if the user is watching units, scrolling, or sitting over unexplored terrain, and large paths or strategic planning by the AI made the game turn fluctuate fairly wildly. Overlay containers in the cluster making code changes immediately available. Gefyra. Version 1. Usually. Until, it isn't. (BACK TO TOP)
https://neugierig.org/software/blog/atom.xml
The most common question about retrowin32 , my Windows emulator — after "why even do this?" — is about how it actually works. This is the kind of thing that now feels obvious to me but which was a great mystery before I understood it, so here I hope to present it in a way that will make it obvious to you too. Emulating the Windows API To start with, imagine you're on an x86 machine that is running some OS other than Windows and you want to run a Windows program somehow. To execute a Windows .g. (BACK TO TOP)
https://medium.com/digital-mckinsey
By Katterine Rodriguez and Victor Souza — Specialists at McKinsey & Company We recently had the pleasure of participating in QCon, a global conference that gathers the best engineers from top-notch innovation companies. The event covers a wide range of relevant software engineering and leadership topics related to the kind of projects that have been carried out in our region. This is known as team development. Forming stage: This happens when the team first comes together. 2.github. (BACK TO TOP)
https://medium.com/schibsted-engineering
Some time ago, our central cloud governance team was piloting a new way of authentication towards AWS via AWS SSO. We thought it would be an excellent opportunity to revise our current flow, draw conclusions and proceed with some improvements. I was asked to provide support in this regard. My goal was clearly defined. I wanted to design and introduce a flow that won’t annoy my teammates. This can be pretty cumbersome. or even work in a multi-account setup. The idea is simple and easy to manage. (BACK TO TOP)
https://eli.thegreenplace.net/
Suppose you have a domain that hosts your website: domain.com , and the website is served with the venerable Apache HTTP server . Suppose, also, that you want to run some backend application on the same domain, perhaps using a sub-domain like sub.domain.com . Running an application on a non-standard port (not 80 or 443) is not a problem, but what it you need it to run on port 80? Apache occupies port 80 in order to serve domain.com , so at least on the surface this seems like a problem.domain.0. (BACK TO TOP)
https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast
Want to change someone’s mind? First, explains Robert Cialdini, you have to change their framing. For Cialdini , the Regent's Professor Emeritus of Psychology and Marketing at Arizona State University, persuasion begins before we even deliver our pitch or presentation. Through what he calls “pre-suasion,” communicators can prime audiences to receive messages in a specific way, simply by drawing their attention in specific directions. See Privacy Policy at https://art19. (BACK TO TOP)
Netflix waited out Blockbuster with better economics, and it's seeking to do the same with its competitors today; the key to the company's differentiation, though, is increasingly creativity, not execution. (BACK TO TOP)
The technical journey discusses the motivations, challenges, and technical solutions employed for warehouse schematization, especially a change to the wire serialization format employed in Meta’s data platform for data interchange related to Warehouse Analytics Logging. Here, we discuss the engineering, scaling, and nontechnical challenges of modernizing Meta’s exabyte-scale data platform by migrating to the new [...] Read More... (BACK TO TOP)
Mechanisms I've found via trial and error: Pilot & copilot, literature review, methodology review, and timeboxes. (BACK TO TOP)
Sometimes great results in code performance come with a small amount of work. We’d like to tell you a story about how we changed the Allegro mobile homepage and reduced usage of Allegro service infrastructure with only a few lines of code. The problem The story is about the homepage in the Allegro app on Android and iOS , the first screen a user sees when opening the app. A lot was happening there. The idea We decided to split the homepage content into two parts. (BACK TO TOP)
Scalable Annotation Service — Marken by Varun Sekhri , Meenakshi Jindal Introduction At Netflix, we have hundreds of micro services each with its own data models or entities. For example, we have a service that stores a movie entity’s metadata or a service that stores metadata about images. All of these services at a later point want to annotate their objects or entities. Annotations Sometimes people describe annotations as tags but that is a limited definition. Allows to annotate any entity. (BACK TO TOP)
https://blog.pragmaticengineer.com/
Of the biggest tech companies, only Apple has not executed major job cuts. But why is this, and can we now expect it to follow suit by shedding workers? (BACK TO TOP)
Slack is a great tool for collaboration, but it can be hard to keep up with all the (BACK TO TOP)
Originally, the domain part of a web address was all ASCII (so no accents, no emojis, no Chinese characters). This was extended a long time ago thanks to something called internationalized domain name (IDN). Today, in theory, you can use any Unicode character you like as part of a domain name, including emojis. Whether that is … Continue reading International domain names: where does https://meßagefactory.ca lead you? (BACK TO TOP)
https://surfingcomplexity.blog
An effective observability solution is one that helps an operator quickly answer the question “Why is my system behaving this way?” This is a difficult problem to solve in the general case because it requires the successful combination of three very different things. Most talk about observability is around vendor tooling. I’m using observability tooling … Continue reading Why you can’t buy an observability solution off the shelf → (BACK TO TOP)
It’s 2015 and after being in the community for over a year, Kubernetes has finally had its first general availability release. It is a plug-and-play platform ‘ for platforms’ that makes it extremely popular in the cloud-native ecosystem. But now, dealing with Kubernetes objects can easily become complex. This has led to the need to start orchestrating multiple Kubernetes configuration files. And everything is defined using YAML files, given its declarative nature.helmignore chart.yaml values.4. (BACK TO TOP)
rqlite is a lightweight, open-source, distributed relational database written in Go, which uses SQLite as its storage engine. It passed another milestone this month in the open-source world, by passing 13,000 stars on GitHub. (BACK TO TOP)
https://maximumeffort.substack.com
In which I discuss the incredible effort put into making Stargate's Egyptian/Alien thesis historically accurate, and William Shatner exposes the true nature of the Great Pyramid as an RF antenna. (BACK TO TOP)
https://www.tbray.org/ongoing/ongoing.atom
Like many companies, Dropbox runs experiments that compare two product versions—A and B—against each other to understand what works best for our users. When a company generates revenue from selling advertisements, analyzing these A/B experiments can be done promptly; did a user click on an ad or not? However, at Dropbox we sell subscriptions, which makes analysis more complex. We could wait 90 days to see if the user converts and continues on a paid subscription, but that takes a long time. (BACK TO TOP)
Slack launched GovSlack in July 2022. With GovSlack, government agencies, and those they work with, can enable their teams to seamlessly collaborate in their digital headquarters, while keeping security and compliance at the forefront. Using GovSlack includes the following benefits: Supports key government security standards, such as FedRAMP High, DoD IL4, and ITAR Runs in […] The post What We Learned from Building GovSlack appeared first on Slack Engineering . (BACK TO TOP)
In recent years, monorepos have become a trending topic in the IT community. When using a monorepo, an organization stores all its projects in the same repo. Monorepos are particularly popular among web developers, since most of their projects use JavaScript or TypeScript and rely on the same npm dependencies. In this tutorial, we’ll go over what a monorepo is, why, and when you should consider adopting it, and how to set up a TypeScript monorepo with npm...json file for you.0...... ├── package. (BACK TO TOP)
The with keyword in python is used for exception handling when working with certain resources like files or database connections. These resources may need to have additional actions performed if an exception is raised. For example, if there is an error reading from a file, we’d like to be certain the file gets closed before the program exits and raises the error. In this article, we’ll take a deeper look at the with keyword. Prerequisites Working knowledge of Python Python 3.txt" , "w" ) file . (BACK TO TOP)
https://www.timescale.com/blog/
How TimescaleDB Solves Common PostgreSQL Problems in Database Operations With Data Retention Management
Poor partition management when handling data retention can lead to outages of your PostgreSQL database. Read how TimescaleDB solves this using lock minimization strategies. (BACK TO TOP)
(Part I)](https://www.timescale.com/blog/timescale-timeout-the-history-and-basics-of-postgresql-part-i/)
Learn more about PostgreSQL in this episode of Timescale Timeout: how it was created, its use cases, behind-the-scenes stories, and starter (to more advanced) tips. (BACK TO TOP)
Want to inflict terrible things on other programmers who show up later to do maintenance work? Write C++ code that doesn't need a main(). Then write C++ code that doesn't have a main(). Yes. I mentioned this quite a while back, calling it "spooky action at a distance" in code, but looking at that now, it seems like it was a very long and drawn out demonstration. Instead, tonight, I present a far simpler version. Usual disclaimers apply: may summon Ancient Ones who will haunt your soul...] $ . (BACK TO TOP)
Given that we're now within 15 years of the signed 32-bit time_t craziness, I decided to start playing around with my own stuff to see how things are doing. I wanted to see what would break and what would work. One thing I particularly wanted to see was how my smaller systems would work. It's basically a given that my 64 bit Linux boxes are going to be fine since time_t is already wider, and it won't explode in 2038. But that's far from the whole story..... systemd[1]: Freezing execution........ (BACK TO TOP)
Two Alexa AI papers present novel methodologies that use vision and language understanding to improve embodied task completion in simulated environments. (BACK TO TOP)
Prompt engineering enables researchers to generate customized training examples for lightweight “student” models. (BACK TO TOP)
There are three specific activities I have loved in some product managers I've worked with (and missed in others). tldr; Talk with customers and prospects Develop and share a vision Evangelize Talk with customers and prospects As a product manager, your superpower over engineering is to have spent time with customers and prospects. You should have (or develop) a good understanding of the market and your product's potential. Understanding their workflows and their issues.co/5vTWTNhs68 pic. (BACK TO TOP)
This is an external post of mine. Click here if you are not redirected. (BACK TO TOP)
Note : This article is also available in Korean . On our tour of South Korea’s so-called security applications we’ve already took a look at TouchEn nxKey , an application meant to combat keyloggers by … checks notes … making keylogging easier. Today I want to shed some light on another application that many people in South Korea had to install on their computers: IPinside LWS Agent by Interezen. The stated goal of the application is retrieving your “real” IP address to prevent online fraud.168. (BACK TO TOP)
In the aftermath of the LastPass breach it became increasingly clear that LastPass didn’t protect their users as well as they should have. When people started looking for alternatives, two favorites emerged: 1Password and Bitwarden. But do these do a better job at protecting sensitive data? For 1Password, this question could be answered fairly easily. The secret key functionality decreases usability, requiring the secret key to be moved to each new device used with the account. (BACK TO TOP)
https://www.ardanlabs.com/blog/
Introduction In episode 17, Bill began to design an in-memory accounting database that will store the account balances on his blockchain. To build this database, Bill will add a memory pool on each node that stores a list of public addresses with their respective balances. The balances on these addresses are reconstructed by reading the previous transaction records found on his blockchain. In this video, Bill will define the types of transactions his blockchain will support. (BACK TO TOP)
Introduction In episode 18, Bill defined the Go type that will represent a transaction and implemented the methods to validate one. While developing the transaction type, Bill states that he’ll be borrowing concepts from Ethereum to ensure that he’s building a reference implementation. Bill’s transaction type has a field named nonce, similar to Ethereum, that ensures transactions are executed in order. (BACK TO TOP)
Introducing the official launch of Replit India - Replit's first international launch! Thank you to the 2M+ developers from India who have signed up for Replit to learn to code, and host & deploy projects. Replit's mission is to bring the next billion coders online, and this is not possible without India. We have launched a plethora of products and initiatives for Indian developers to learn to code, earn Cycles anywhere, anytime and host & deploy their project on Replit 24/7.replit.com! (BACK TO TOP)
Databases and web apps go together like peanut butter and jelly. In a word, they're inseparable. And despite all the amazing innovations in NoSQL data stores, often a good old relational database is the most reliable tool for the job. We want to make it completely seamless to develop applications that need databases on Replit. Starting today, you can create and instantly begin to use PostgreSQL databases from within the Replit workspace. Here's how you use it.env.DATABASE_URL) client.rows[0]. (BACK TO TOP)
https://engineering.linkedin.com/blog.rss.html
Co-authors: Michele Ursino and Joe Xue Introduction At LinkedIn, we believe that an opportunity can arise from just one conversation, so having reliable and powerful messaging capabilities to enable people to have those meaningful and professional conversations is crucial. Over the years, we have evolved our messaging platform to meet the needs of our 900 million members and customers. (BACK TO TOP)
Co-Authors: Xianyun Mao, Stan Xu, Rachit Kumar, Vikas R, Xia Hong, and Divyakumar Menghani As a LinkedIn member, you can subscribe to LinkedIn Premium on a monthly or annual basis. For our customers, we offer the same option for our Talent Solutions and/or Sales Navigator products. For each, LinkedIn offers subscription renewal payments. In this blog, we will discuss how we replaced the existing rule-based approach […] (BACK TO TOP)
.hilite {cursor:zoom-in} a:link img.hilite, a:visited img.hilite {color: #fff;} a:hover img.hilite {color: #f66;} The 8086 processor was introduced in 1978 and has greatly influenced modern computing through the x86 architecture. One unusual instruction in this processor is HLT, which stops the processor and puts it in a halt state. In this blog post, I explain in detail how the halt circuitry is implemented and how it interacts with the 8086's architecture. The Group Decode ROM.e. ↩ (BACK TO TOP)
.hilite {cursor:zoom-in} a:link img.hilite, a:visited img.hilite {color: #fff;} a:hover img.hilite {color: #f66;} Intel introduced the 8086 microprocessor in 1978 and it had a huge influence on computing. I'm reverse-engineering the 8086 by examining the circuitry on its silicon die and in this blog post I take a look at how conditional jumps are implemented. Conditional jumps are an important part of any instruction set, changing the flow of execution based on a condition. Based on NEC v.e. ↩ (BACK TO TOP)
.hilite {cursor:zoom-in} The Soviet space program used completely different controls and instruments from American spacecraft. One of the most interesting navigation instruments onboard Soyuz spacecraft was the Globus, which used a rotating globe to indicate the spacecraft's position above the Earth. This navigation instrument was an electromechanical analog computer that used an elaborate system of gears, cams, and differentials to compute the spacecraft's position. Side view of the Globus INK. (BACK TO TOP)
Tailscale’s API gives you programmatic access to many of your Tailscale resources, including devices on your tailnet, access controls in your tailnet policy file, and DNS settings. Today we’re launching two improvements to how you authenticate to the Tailscale API: the ability to create scoped access tokens limited to specific operations, and the ability to continually generate or refresh access tokens using OAuth clients. These clients can then be used with any standard OAuth 2. (BACK TO TOP)
End-user programming and automation has a long history on Apple’s platforms. It began with BASIC being included in the ROM of the Apple II, continued in the 1980s with HyperCard , and was further expanded with AppleScript in the ’90s and Automator in the 2000s. The modern successor to those systems is Shortcuts , which was launched in iOS 13 and macOS 12. Starting with Tailscale v1. We’ve added actions for managing the connection state, using exit nodes , and switching between profiles . (BACK TO TOP)
Traefik , the popular load balancing and reverse proxy tool, has added support for Tailscale as a certificate resolver in Traefik Proxy 3.0 beta, the latest release of its forward proxy offering. Today, one of the engineers behind this integration has published a fun deep dive into how it works and how they’re using Tailscale to help with testing at Traefik. Since Tailscale v1. We’ve got sample config files and more information in our documentation if you’re interested. (BACK TO TOP)
On Dec. 23, 2022, KrebsOnSecurity alerted big-three consumer credit reporting bureau Experian that identity thieves had worked out how to bypass its security and access any consumer's full credit report -- armed with nothing more than a person's name, address, date of birth, and Social Security number. Experian fixed the glitch, but remained silent about the incident for a month. This week, however, Experian acknowledged that the security failure persisted for nearly seven weeks, between Nov. (BACK TO TOP)
Denis Emelyantsev, a 36-year-old Russian man accused of running a massive botnet called RSOCKS that stitched malware into millions of devices worldwide, pleaded guilty to two counts of computer crime violations in a California courtroom this week. The plea comes just months after Emelyantsev was extradited from Bulgaria, where he told investigators, “America is looking for me because I have enormous information and they need it.” (BACK TO TOP)
T-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile said an investigation determined that someone abused its systems to harvest subscriber data tied to approximately 37 million current customer accounts. (BACK TO TOP)
Posted by Sreenivas Gollapudi, Senior Staff Research Scientist, and Kostas Kollias, Staff Research Scientist, Google Research, Algorithms & Optimization Team In many computing applications the system needs to make decisions to serve requests that arrive in an online fashion. Consider, for instance, the example of a navigation app that responds to driver requests. In such settings there is inherent uncertainty about important aspects of the problem., the route is.g. (BACK TO TOP)
Posted by Posted by Alvin Rajkomar, Research Scientist, and Eric Loreaux, Software Engineer, Google Research Today many people have digital access to their medical records , including their doctor’s clinical notes. However, clinical notes are hard to understand because of the specialized language that clinicians use, which contains unfamiliar shorthand and abbreviations .g.” To disambiguate between multiple meanings, the surrounding context must be considered.e.0 / Cropped from original.0 . (BACK TO TOP)
Posted by Marian Croak, VP, Google Research, Responsible AI and Human-Centered Technology (This is Part 2 in our series of posts covering different topical areas of research at Google. You can find other posts in the series here.) The last year showed tremendous breakthroughs in artificial intelligence (AI), particularly in large language models (LLMs) and text-to-image models. These technological advances require that we are thoughtful and intentional in how they are developed and deployed. (BACK TO TOP)
I lost interest in computer hardware during the 2010s. It seemed years would pass with only meager, marginal improvements. Intel was stuck in a rut, so CPUs were barely improving. The only bright spot for me was Apple's progress with their A-series chips for phones. But that felt like a segregated reality from that of regular computers. Not just in Apple land, but with AMD and Intel too. The generational jumps are happening more frequently, and the gains aren't measly any longer. (BACK TO TOP)
This is my favorite kind of day. An entirely empty schedule combined with a juicy, challenging project to dedicate it to. The perfect antidote to the dread that occasionally sets in when a whole week is devoured by #ExecutiveLife. Nothing invigorates the soul like seeing something come together out of nothing, and to do that, you need these long stretches of uninterrupted time. I occasionally get asked how I manage to juggle it all . This is the secret. But Jason and I always worked like this. (BACK TO TOP)
It'd been a couple of years since I'd gotten a new Android phone. The last one was the One Plus 8 Pro. Nice phone, but I hated the screen water-falling over the edge. And I absolutely cannot stand the One Plus hijinks applied to scroll acceleration. So I've pretty much only used it as a spare Fortnite machine for the kids, except when I explicitly had to test some of our apps on Android. But this week I got the Asus Zenfone 9 , after MKBHD's glowing review . It's nice.1 test . Took forever. (BACK TO TOP)
Back in 2018, when I first wrote about sizing engineering teams , I was surprised how much my advice rankled a colleague. He wanted to spin up a new engineering team of two people, which I thought was a bad idea. It would be a fragile team that would fall apart quickly if it didn’t grow. It would be missing the components we’d seen make other teams successful, like an engaged manager or ability to handle on-call if someone took a vacation. Both are valuable approaches to keep in your pocket. (BACK TO TOP)
Whenever an executive joins a new company, there is an awkward merger between the executive’s preferred communication style and the norms that organization has already established. I remember a recently joined executive complaining that engineers weren’t reading his emails. He “solved” that problem by sending another email, this one instructing the team that they were responsible for reading their email twice a day. You won’t be shocked to learn that this didn’t really solve the problem.g. (BACK TO TOP)
When I shared my piece on Measuring an engineering organization , one point I made was that focusing too heavily on optimization metrics (e.g. things like CI/CD time) can turn engineering into a cost center. That’s not because optimization metrics aren’t important, they’re extremely important! Rather, it’s inherent to what it means to refer to an organization as a cost center. Other organizations were not invited. However, I think this common usage isn’t very helpful. (BACK TO TOP)
As you plan for a new growing season, learn how a one-byte-at-a-time approach to processing large amounts of agronomic data can simplify your path to success. The post One Byte at a Time: Agronomy Data Insights and Elephants appeared first on DTN . (BACK TO TOP)
Support your sales and marketing efforts by accessing agriculture's leading producer database. The post Capture producer insight with FarmMarket data appeared first on DTN . (BACK TO TOP)
DTN has announced the launch of a WeatherFactor API to assist freight traders in pre-voyage planning and allow them to better anticipate voyage duration risks. The post DTN announces launch of WeatherFactor API to enhance pre-voyage planning appeared first on DTN . (BACK TO TOP)
Pluralistic: The public paid for "Moderna's" vaccine, and now we're going to pay again (and again and again); How Facebook's Real Names policy helps Cambodia's thin-skinned dictator terrorize dissenters (25 Jan 2023)
Today's links The public paid for "Moderna's" vaccine, and now we're going to pay again (and again and again): Herd immunity is incompatible with shareholder capitalism. How Facebook's Real Names policy helps Cambodia's thin-skinned dictator terrorize dissenters: "Yes, our beaches are the most beautiful, but our leaders are the dirtiest in the world, aren’t they?" Hey look at this: Delights to delectate. Moderna's manufacturing costs are $2.petrieflom.law.harvard.nytimes.levernews.levernews.ucl. (BACK TO TOP)
Today's links David Graeber's "Pirate Enlightenment": The true, swashbuckling lives of matriarchs, anarchists, and pirates at the crossroads of the world. Hey look at this: Delights to delectate.net/2020/09/07/facebook-v-humanity/#spectre And what books Graeber had left in him! Just weeks prior to his death, Graber finished Dawn Of Everything, his ten-year collaboration with David Wengrow. https://us.macmillan. I read a prepublication draft of the book for a blurb, and I was riveted.substack.ac. (BACK TO TOP)
Today's links Eggflation is just more price-gouging: Cal-Maine Foods owns every egg brand you've ever heard of and its profits are up 65%. Hey look at this: Delights to delectate. They weren't exactly subtle about it: the CEOs of America's largest companies got on their quarterly investor calls and chortled about the willingness of "consumers" to blame inflation for the price-hikes they were cramming down their throats: https://pluralistic. A dozen "conventional" eggs are currently averaging $2. (BACK TO TOP)
Today's links Tiktok's enshittification: The company manually allocates surplus to creators, and they can take it away again, too. Hey look at this: Delights to delectate. Then, they die. When a platform starts, it needs users, so it makes itself valuable to users. Think of Amazon: for many years, it operated at a loss, using its access to the capital markets to subsidize everything you bought. It sold goods below cost and shipped them below cost. It operated a clean and useful search.substack. (BACK TO TOP)
If you play games on multiple consoles, you’re probably familiar with the occasional bout of uncertainty that comes with each system’s unique button arrangement. They’re all more or less in …read more (BACK TO TOP)
In the news among aviation enthusiasts, the ADS-B data aggregation and aircraft tracking site ADSB-Exchange has been sold by its founder to JETNET for a reported $20m. This type of …read more (BACK TO TOP)
Talking about high-quality USB-C implementations, there’s a product that has multiple selling points designed around USB-C, and is arguably a shining example of how to do USB-C right. It’s the …read more (BACK TO TOP)
Modern gaming console controllers aren’t without their annoyances — Joy-Con drift, anyone? The problems might stem from design deficiencies, but we suspect that user enthusiasm and the mechanical stress it …read more (BACK TO TOP)
In today's IPv6 Buzz podcast, Ed, Scott, and Tom speak with Jad El Cham about the RIPE NCC IPv6 training program as well as RIPE NCC's role as the European and Middle Eastern Regional Internet Registry providing Internet resources including IPv6 addresses. The post IPv6 Buzz 118: IPv6 Training At RIPE NCC appeared first on Packet Pushers . (BACK TO TOP)
On today's Day Two Cloud podcast we talk about Compute Express Link (CXL), a technology for composable infrastructure. The idea is to take all the peripherals in a system---network cards, memory, graphical processing units, and so on---and put them on a bus outside the chassis to share them among multiple hosts. Is this the dream of composable infrastructure coming true? The post Day Two Cloud 179: Will CXL Make Composable Infrastructure Real? appeared first on Packet Pushers . (BACK TO TOP)
Network Break 414: 230 Juniper Vulnerabilities, Should Cisco Patch An EOL Router, T-Mobile Takes Weeks To Spot Breach
On today's Network Break podcast we cover a raft of Juniper vulnerabilities, whether Cisco should patch serious vulnerabilities in end-of-life products, a big T-Mobile breach, Avaya dealing with significant debt, sweeping rounds of layoffs, and more IT news. The post Network Break 414: 230 Juniper Vulnerabilities, Should Cisco Patch An EOL Router, T-Mobile Takes Weeks To Spot Breach appeared first on Packet Pushers . (BACK TO TOP)
On today's Heavy Networking, guest Tom Costello walks us through his personal lab in the cloud. We discuss pros and cons of the cloud vs. a basement, using EVE-NG vs. CML, how automation can help you manage cloud costs, resources for those who might want a cloud lab, and more. The post Heavy Networking 662: Home Lab In The Cloud Or Your Basement? appeared first on Packet Pushers . (BACK TO TOP)
https://www.microsoft.com/en-us/security/blog/
Learn about the latest types of identity-based cyberattacks and how your organization can create an integrated, layered defense. The post 2023 identity security trends and solutions from Microsoft appeared first on Microsoft Security Blog . (BACK TO TOP)
We share technical details of our work on the AddressSanitizer (ASAN) and how it contributes to durably improving software quality and security at Microsoft. The post Introducing kernel sanitizers on Microsoft platforms appeared first on Microsoft Security Blog . (BACK TO TOP)
Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results
Learn how Microsoft Security is simplifying security for the new hybrid, multi-platform environment while fostering a diverse new generation of defenders—and how your organization can benefit. The post Microsoft Security reaches another milestone—Comprehensive, customer-centric solutions drive results appeared first on Microsoft Security Blog . (BACK TO TOP)
Learn about the more than 300 Microsoft Security innovations launched in 2022, and how we’re making cybersecurity more inclusive and representative of our communities. The post Microsoft Security innovations from 2022 to help you create a safer world today appeared first on Microsoft Security Blog . (BACK TO TOP)
Discover new data protection innovations, get best practices, and explore the latest research and insights at the Microsoft Purview digital event. The post Digital event highlights new features in Microsoft Purview appeared first on Microsoft Security Blog . (BACK TO TOP)
The Most Loved languages are those that appeal to veteran developers. The post Comparing tag trends with our Most Loved programming languages appeared first on Stack Overflow Blog . (BACK TO TOP)
In complex systems, you usually want to minimize chaos. Unless you're trying to find weak spots. In that case, chaos is your friend. The post How chaos engineering preps developers for the ultimate game day (Ep. 531) appeared first on Stack Overflow Blog . (BACK TO TOP)
Your ML model and AI-as-a-service apps might open new attack surfaces. Here's how to mitigate them. The post AI applications open new security vulnerabilities appeared first on Stack Overflow Blog . (BACK TO TOP)
The team talks about voice-to-code features, how game developers built accessibility into God of War, and why lab-grown meat is officially safe to eat (hail seitan!). The post From your lips to AI’s ears (Ep. 530) appeared first on Stack Overflow Blog . (BACK TO TOP)
Using only Tetris, you can build a machine capable of universal computation. The post How to build a universal computation machine with Tetris (Ep. 529) appeared first on Stack Overflow Blog . (BACK TO TOP)
Side project to C-suite, historical telescope lenses, and 3D CSS. The post The Overflow #161: Git isn’t the only game in town appeared first on Stack Overflow Blog . (BACK TO TOP)
We continue to expand and improve our data localization suite to help support our customers who have to comply with data localization requirements (BACK TO TOP)
With Data Privacy Day just a few days away, we think it’s important to focus on all the ways security measures and privacy-enhancing technologies help keep personal data private and why security measures are so much more critical to protecting privacy (BACK TO TOP)
Enhancing the Arm Secure Boot chain to improve platform security on modern systems. (BACK TO TOP)
Several Cloudflare services became unavailable for 121 minutes on January 24th, 2023 due to an error releasing code that manages service tokens. The incident degraded a wide range of Cloudflare products (BACK TO TOP)
At Cloudflare, we take steps to ensure we are resilient against failure at all levels of our infrastructure. This includes Kafka, which we use for critical workflows such as sending time-sensitive emails and alerts. (BACK TO TOP)
In this post, we review selected Internet disruptions observed by Cloudflare during the fourth quarter of 2022, supported by traffic graphs from Cloudflare Radar and other internal Cloudflare tools, and grouped by associated cause or common geography. (BACK TO TOP)
Last September, at the 🇨🇭 Swiss Cloud Native Day, Florian Forster, co-founder & CEO of ZITADEL, talked about why they switched to serverless containers. ZITADEL has a really interesting workload that is both CPU intensive and latency sensitive. On top of this, their users are global, and traffic is bursty. Florian talks about how they evaluated AWS, GCP & Azure before they settled on the platform that met their requirements. (BACK TO TOP)
Creating and sharing reproducible development environments for AI experiments and production systems is a huge pain. You have all sorts of weird dependencies, and then you have to deal with GPUs and NVIDIA drivers on top of all that! brev.dev is attempting to mitigate this pain and create delightful GPU dev environments. Now that sounds practical! (BACK TO TOP)
Fred K. Schott joins the party again to discuss all the new and fun changes in Astro 2. Nick and KBall dig in on what’s new, what’s exciting, and what to expect from the framework built around content. (BACK TO TOP)
Prioritizing tech debt, UI components to copy/paste, learnings from 20 years in software, git-sim & jqjq (Changelog News)
Max Countryman wrote up a framework for prioritizing tech debt, shadcn builds a copy/paste-able UI component library in public, Justin Etheredge shares 20 things he’s learned in his 20 years as a software engineer, Jacob Stopak’s git-sim lets you easily visualize git operations without affecting your repo & Mattias Wadman implemented jq in jq. (BACK TO TOP)
This week we’re talking about by Postgres with Craig Kerstiens, Chief Product Officer at Crunchy Data, and a well known ambassador for Postgres. Just Postgres. That’s what this week’s show is about. (BACK TO TOP)
Jerod & the gang analyze the State of JS 2022 survey results, play a wicked game of HeadLIES & share some Pro Tips to help you live your best dev life. (BACK TO TOP)
Lars is big on Elixir. Think apps that scale really well, tend to be monolithic, and have one of the most mature deployment models: self-contained releases & built-in hot code reloading. In episode 7, Gerhard talked to Lars about “Why Kubernetes”. There is a follow-up YouTube stream that showed how to automate deploys for an Elixir app using K3s & ArgoCD. (BACK TO TOP)
https://towardsdatascience.com
Compare tables and extract their differences with standard SQL Continue reading on Towards Data Science » (BACK TO TOP)
And how to use them Continue reading on Towards Data Science » (BACK TO TOP)
How we deal with Big Data at Emplifi Continue reading on Towards Data Science » (BACK TO TOP)
An inspiration from software development Introduction Setting up a development environment is usually the first step people do when starting any coding project. An effective development environment can be a huge productivity boost that helps us to produce high-quality work. This process in data science, however, is very ambiguous compared to other fields like software development due to its own uniqueness and challenges. Settling into the team was complete chaos. We can get the best out of both. (BACK TO TOP)
Exploring transformations for time series and how to revert them with scalecast in Python Continue reading on Towards Data Science » (BACK TO TOP)
There’s an entire subfield of machine learning devoted to textual data (hello, natural language processing), while visual data has fueled the massive growth of computer vision and image-generation applications. Both data types have captivated our collective imagination for months with the rise of AI tools like ChatGPT, Midjourney, and Stable Diffusion. This week, we turn to the world of audio and music to highlight projects and workflows our authors have recently explored. (BACK TO TOP)
Methods for efficient consumption of large files Photo by Aron Visuals on Unsplash Working with very large files can pose challenges to application developers related to efficient resource management and runtime performance. Text file editors, for example, can be divided into those that can handle large files, and those that make your CPU choke, make your PC freeze, and make you want to scream. These challenges are exacerbated when the large files reside in a remote storage location.g.g.g.s3.g. (BACK TO TOP)
Theory and practice explained in detail Continue reading on Towards Data Science » (BACK TO TOP)
A practical introduction to a technology you use every day. Photo by Etienne Girardet on Unsplash Ever wondered how Google Translate’s ‘detect language’ feature works? Of course you didn’t, you had better things to do. But I went looking, and couldn’t find the answer (even though I’ve literally written a book on Natural Language Processing (NLP)). It’s Google’s secret sauce. You’ll be adding it to your GitHub portfolio in no time.g. And focusing on stopwords could make it even worse.g.".g.g.B. (BACK TO TOP)
The significance of Occam’s Razor in data science and machine learning Continue reading on Towards Data Science » (BACK TO TOP)
https://cloud.google.com/blog/
They run containers on Google Cloud. Why is that important and why should you care? Containers are at the heart of modern applications. According to the 2022 State of DevOps report, containers have been the number one deployment target for primary services and applications for the past two years, and adoption continues to accelerate rapidly. Nowhere is this more evident than in the retail industry. Google pioneered container technologies and Google Cloud is optimized for containers. (BACK TO TOP)
Today’s leading organizations want to ensure their business users get fast access to data with real-time governed metrics, so they can make better business decisions. Last April, we announced our unified BI experience, bringing together both self-serve and governed BI. Now, we are making our Looker connector to Looker Studio generally available, enabling you to access your Looker modeled data in your preferred environment. Learn more about the connector here . (BACK TO TOP)
“Are we making it easier for customers to buy hammers or are we stuck on toil?” At The Home Depot, part of SRE’s responsibility is to keep our developers focused on building the technologies that make it easier for our customers to buy home improvement goods and services. So we like to use the hammer question as a barometer of whether a process or technology needs to be automated/outsourced, or whether it is something that deserves our attention as engineers. Pricing for existing tiers redu... (BACK TO TOP)
When it comes to pricing strategy, balancing profit and conversion has long been a challenge for retailers, and one compounded by today’s rapidly changing commerce landscape. Macroeconomic factors such as rising costs of goods, fluctuating costs of shipping, changing consumer demand, and inflation make keeping up with pricing decisions nearly impossible. The solutions were developed with retailers at the forefront of the design. It is also precisely why Google is excited about the partnership. (BACK TO TOP)
Data is one of the single most valuable assets for organizations today. It can empower businesses to do incredible things like create better views of health for hospitals , enable people to share timely insights with their colleagues, and — increasingly — be a foundational building block for startups who build their products and businesses in a data cloud . Last year, we shared that more than 800 software companies are building their products and businesses with Google’s data cloud. (BACK TO TOP)
As a Platform Administrator or Operator, you've already been using Config Sync to sync your configurations — deployments, policy definitions, Helm charts, ConfigMaps, and more — consistently across many Kubernetes clusters. But with the excitement of solving one problem comes a new one: real time visibility on configuration syncs and failures across clusters. Key components Dashboard : focuses on the overall status of all configurations and resources across one or multiple clusters... (BACK TO TOP)
In 2022 we saw several major elections across the globe. And as many countries prepare for elections in 2023 and 2024, we’d like to re-introduce a set of transparency tools that Google provides in the election advertising space. We know that election advertising is an important component of the democratic process – candidates use ads to raise awareness about their campaigns, share information and engage potential voters. Political Transparency dataset user-friendly interface.google.wagtailcore. (BACK TO TOP)
Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more. Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here: Google Cloud blog 101: Full list of topics, links, and resources . Week of Jan 23 - Jan 27, 2023 Starting with Anthos version 1.y.z) for supported minor versions. For more information, read here . mFit 1.14. (BACK TO TOP)
Enabling retailers and brands to use technology to discover new opportunities for growth, innovation and productivity is one of our greatest passions here at Google Cloud. Every year, we look forward to the National Retail Federation (NRF) annual conference and expo, and Retail’s Big Show did not disappoint. We’ll continue to update this post as more content is published, so you check back for our latest insights, lessons, and stories from the retail event of the year.wagtailcore.rich_text. (BACK TO TOP)
With many dramatic shifts in the world of retail over the past two decades — from the explosion of e-commerce to the COVID pandemic — digitalization is no longer just a strategic choice for companies in the retail and consumer packaged goods (CPG) industry, but a necessity for survival. Retail digitalization calls for increased developer productivity Developers are a key element in enabling a digital-first strategy and shortening time-to-market. (BACK TO TOP)
How Confidential Space and multi-party computation can help manage digital assets more securely and efficiently
Managing digital asset transactions and their often-competing requirements to be secure and timely can be daunting. Human errors can lead to millions in assets being instantly lost, especially when managing your own encryption keys. This is where multi-party computation (MPC) can help reduce risk stemming from single points of compromise and facilitate instant, policy-compliant transactions. Distributed parties can participate in a signing process that is both auditable and policy-compliant. (BACK TO TOP)
Editor’s note : Six customers, across a range of industries, share their success stories with Google Cloud databases. From professional sports leagues to kidney care and digital commerce, Google Cloud databases enable organizations to develop radically transformative experiences for their users. Here are some of the key stories that customers shared at Google Cloud Next. "File metadata like location, size, and more, are stored in a NoSQL table and accessed at every download. Visit MLB.com. (BACK TO TOP)
A SQL Server DBA has many options for transferring data from one SQL Server instance to a new environment - those options can be overwhelming. This blog aims to help you decide what option you might want to choose for your specific migration scenario. Knowing the acceptable downtime will allow you to weigh the complexity of the continuous migration options with the simplicity of one-time approaches. Striped backups should be used for 5TB+ DBs due to file size limitations ., have disadvantages. (BACK TO TOP)
A collaboration between Google Cloud and NVIDIA has enabled Apache Beam users to maximize the performance of ML models within their data processing pipelines, using NVIDIA TensorRT and NVIDIA GPUs alongside the new Apache Beam TensorRTEngineHandler . The NVIDIA TensorRT SDK provides high-performance, neural network inference that lets developers optimize and deploy trained ML models on NVIDIA GPUs with the highest throughput and lowest latency, while preserving model prediction accuracy. (BACK TO TOP)
Native image compilation has been an emerging technology in the Java community for a number of years. In a sentence, it offers a smaller memory footprint and dramatically faster startup times which makes it especially well suited for Serverless use cases. Earlier in 2022, at I/O , we discussed the technology in more depth and how to get started with the project during its experimental phase. Since then, the project has gained first class support, as promised at SpringOne 2021 . (BACK TO TOP)
As more enterprise customers are adopting a hybrid and multi cloud strategy, centralized security and governance become increasingly important as workloads are distributed across the environments. Anthos is our cloud-centric container platform to run modern applications anywhere consistently and at scale. Anthos Config Management (ACM) automates policy and security for Kubernetes clusters and is comprised of Config Sync , Config Controller , and Policy Controller .e.e.2.2.2.5. (BACK TO TOP)
Private Service Connect (PSC) allows private consumption of services across VPC networks that belong to different groups, teams, projects, or organizations. In some cases it can be a much better alternative than VPC Peering, Shared VPC or other approaches of private connectivity. In this blog post we are sharing a workaround to use PSC to access Cloud SQL. Assuming the different application team(s) takes care of ownership of their respective application gcp project (left side of diagram).168.32. (BACK TO TOP)
To meet growing demand for cloud services in the Middle East, we are excited to announce plans to bring a new Google Cloud region to Kuwait to support our growing customer base. When it opens, the Kuwait region will deliver high-performance services that make it easier for organizations to serve their own users faster, more reliably and securely.E. Mr. Mazin Saad Alnahedh, Minister of Commerce and Industry and Minister of State for Communications and Information Technology Affairs. Read Article (BACK TO TOP)
An increasing number of Enterprise customers are adopting ML/AI as their core transformational pillars, in order to differentiate, increase revenue, reduce costs and maximize efficiency. This blog post focuses on how to set up your Cloud foundations to cater specifically to the Vertex AI platform and its configuration to be able to set up proper Vertex AI foundations for your future machine learning operations (MLOps) and ML/AI use cases. Development: ML is experimental in nature.5MB. (BACK TO TOP)
Google Cloud is on an exceptional growth trajectory. With our investments in multicloud and AI/ML, to sustainable infrastructure, industry solutions, and technology we are proud that our customers trust Google Cloud solutions to digitally transform their business. We deeply understand today's technology requirements and the need to continuously innovate. More companies are using Google Cloud in their daily business and are trailblazing in their industries. 2. 3. 4. 5.wagtailcore.rich_text. 6.. (BACK TO TOP)
Bulletin by Jakub Mikians