Bulletin for Friday, 10 Feb 2023
7 days digest
The Go Blog (1)
Lucas F. Costa (1)
Stay SaaSy (1)
Weaveworks (1)
Kuba Filipowski (1)
Timescale Blog (1)
Stratechery by Ben Thompson (1)
dropbox.tech (1)
Patterns Blog (1)
Computer Things (1)
Think Fast, Talk Smart: Communication Techniques (1)
L-Space Diaries (1)
Metadata (1)
Julia Evans (1)
Retool Blog (1)
Almost Secure (1)
Maximum Effort, Minimum Reward (1)
Eugene Yan (1)
Tech at Meta (2)
- How Meta spurs collaboration and social interaction in the post-pandemic workplace
- How Meta is bringing augmented reality to everyone
Earthly Blog (2)
- A Practical Guide To Linux Echo Command
- OpenShift vs. Kubernetes: Understanding Container Orchestration Options
Andrew Helwer (2)
Go (Golang) Programming Blog - Ardan Labs on (2)
DTN (3)
- Fuel Prices Ride the Waves of Market Fears and Disruptions
- End-to-end visibility into supply events
- Road Managers Face Multiple Challenges, Including Winter Weather
Sentry Blog RSS (3)
- Profiling Beta for Python and Node.js
- Profiling 101: Why profiling? (2/3)
- Profiling 101: What is profiling? (1/3)
- Learn what an AI-driven future means for cybersecurity at Microsoft Secure
- Solving one of NOBELIUM’s most novel attacks: Cyberattack Series
- Introducing Adaptive Protection in Microsoft Purview—People-centric data protection for a multiplatform world
- U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group
- KrebsOnSecurity in Upcoming Hulu Series on Ashley Madison Breach
- Finland’s Most-Wanted Hacker Nabbed in France
Google AI Blog (4)
- Amplification at the Quantum limit
- Unsupervised and semi-supervised anomaly detection with data-centric ML
- Google Research, 2022 & beyond: Algorithms for efficient deep learning
- Real-time tracking of wildfire boundaries using satellite imagery
- Welcome to Wildebeest: the Fediverse on Cloudflare
- How Cloudflare erroneously throttled a customer’s web traffic
- Manage and control the use of dedicated egress IPs with Cloudflare Zero Trust
- Get notified about the most relevant events with Advanced HTTP Alerts
- Is htmx the way to Go? (Go Time #266)
- MLOps is alive and well (Practical AI #210)
- OpenAI's new text classifier, teach yourself CS, programming philosophies are about state, you might not need Lodash & overrated scalability (Changelog News)
- Qwik has just the right amount of magic (JS Party #261)
- Amazon and Howard University announce academic collaboration
- Pai-Ling Yin brings an academic’s lens to the study of buying and selling at Amazon
- On a mission to demystify artificial intelligence
- AAAI: Prompt engineering and reasoning in the spotlight
- Computer vision for automated quality inspection
The Full Feed - All of the Packet Pushers Podcasts (5)
- IPv6 Buzz 119: Operational Issues With IPv6 Neighbor Discovery
- Day Two Cloud 181: Implementing Patterns And Practices For Infrastructure as Code
- Network Break 416: Ericsson Flogs 5G Network Slicing For Laptops; Microsoft Loads Work Drudgery Onto ChatGPT
- Tech Bytes: Enabling Smart Cloud Migration With VMware And Expedient (Sponsored)
- Heavy Networking 664: Semantic Networking – Science Project Or Networking’s Future?
Pluralistic: Daily links from Cory Doctorow (5)
- Pluralistic: Copyright won't solve creators' Generative AI problem (09 Feb 2023)
- Pluralistic: The Collective Intelligence Institute (07 Feb 2023)
- Pluralistic: Bruce Schneier's "A Hacker's Mind" (06 Feb 2023)
- Pluralistic: When Facebook came for your battery, feudal security failed (05 Feb 2023)
- Pluralistic: Higher interest rates increase both the monetary supply and inflation (04 Feb 2023)
The CircleCI Blog Feed - CircleCI (5)
- Discuss forum builds community out of crisis
- DevOps isn’t dead: How platform engineering enables DevOps at scale
- New CircleCI features for secure secrets management
- Security best practices for CI/CD
- Integrate CircleCI with HashiCorp Vault using OIDC
- Three layers to secure a software development organization
- Engineering’s hidden bottleneck: pull requests
- The AI that writes music from text (Ep. 535)
- The nature of simulating nature: Q&A with IBM quantum computing research
- The Overflow #163: Most Loved vs. most questions
- Why developer experience is the key to better software, straight from the OCTO’s mouth (Ep. 534)
Simon Willison's Weblog: Blogmarks (7)
- ChatGPT Is a Blurry JPEG of the Web
- OpenAI's Whisper is another case study in Colonisation
- PocketPy
- Big Data is Dead
- Making SQLite extensions pip install-able
- The technology behind GitHub’s new code search
- I’m Now a Full-Time Professional Open Source Maintainer
Cloud Blog (17)
- What’s new with Google Cloud
- Health-ISAC and Google Cloud partner to build more resilient healthcare, one threat indicator at a time
- How Anthos helps improve your platform and application security and governance
- Scott Penberthy lost his mom to cancer — he’s now committed to using his passion for AI to advance healthcare
- Beany builds on Google Cloud to revolutionize accounting and financial planning for small businesses
- Running Batch with Nvidia Clara Parabricks
- Extending reality: Immersive Stream for XR is now Generally Available
- Modernized workforce development solutions for our evolving world
- Transform SQL into SQLX for Dataform
- Harden your Kubernetes clusters and monitor workload compliance at scale with new PCI DSS policy bundle
- Large scale hybrid API management: Best practices in configuring clusters, scaling, and operations
- Large scale hybrid API management: Common challenges with structuring the right teams and platform
- Unpacking API Management policies [Part 2]: 5 ways to handle REST API authentication
- Google Cloud Firewall capabilities to enhance your security posture and simplify configuration
- Log-based Metrics in Action
- Leading with digital sustainability
- Deliver trusted insights with automatic data quality
At a fundamental level, a programmer needs to manipulate bits. Modern processors operate over data by loading in ‘registers’ and not individual bits. Thus a programmer must know how to manipulate the bits within a register. Generally, we can do so while programming with 8-bit, 16-bit, 32-bit and 64-bit integers. For example, suppose that I … Continue reading Bit Hacking (with Go code) (BACK TO TOP)
The Go Blog Profile-guided optimization preview Michael Pratt 8 February 2023 When you build a Go binary, the Go compiler performs optimizations to try to generate the best performing binary it can. For example, constant propagation can evaluate constant expressions at compile time, avoiding runtime evaluation cost. Escape analysis avoids heap allocations for locally-scoped objects, avoiding GC overheads. Go improves optimizations from release to release, but this is not always an easy task..... (BACK TO TOP)
https://www.hackerfactor.com/blog/
Today, FotoForensics turns 11 years old! When I first introduced FotoForensics, I didn't know if it would be used by anyone or even if the implementation would have problems with the load. (As I originally wrote, "I wonder how it will scale?") Today, it has received over 6,050,000 unique pictures (with over 800,000 in the last year) and it's in the top 80,000 of internet destinations (the exact position changes every few minutes, but it's around 80,000 right now)., P. B. M., Singh, K. S. (2019). (BACK TO TOP)
Do you remember your backlog ever shrinking? Of course you don’t. Backlogs never shrink. Backlogs never shrink because the list of things we’d eventually like to do never shrinks, and that’s what backlogs are: a bunch of unimportant tasks that we’ll eventually get to, but not today. Important tasks never go into the backlog. We create them, we work on them, and we ship them. I’m sure the answer will be a resounding “never” . Context-sharing and organization alignment will. No, they won’t.com . (BACK TO TOP)
At this stage of technology advancement, most of the good SaaS ideas are already taken. There are still green fields, but the fundraising rampage of the last few years has birthed viable startups in almost every category. Unless you’re lucky enough to be the first and strongest entrant in your sector, you will need to fight a bigger competitor. Let’s talk about a few of the ways to challenge a larger incumbent. Let’s talk about how to do it.g. These are the known ways to reach big customers. (BACK TO TOP)
‘Another way of doing cloud computing’ is how Kubernetes was described when it first came into the picture back in 2014. Until then software was built on monolithic code, making it a challenging task for developers to make even the smallest of changes. From there came microservices - a concept of writing code in smaller pieces. Each piece was processed in smaller computer-like virtual machines (VMs). An upgrade from this was containerization with the principle of ‘write once and run anywhere.e. (BACK TO TOP)
https://www.kubafilipowski.com/
Trafiłem na projekt Maroofy - stronę do odkrywania muzyki w oparciu o utwory, które lubimy. Wystarczy wpisać nazwę piosenki , która nam się podoba i strona podpowiada inne piosenki, które brzmią podobnie. Twórca , pisze, że stworzył własny model, który analizuje dźwięk 120M piosenek z iTunes jako dane wejściowe i tworzy vector embeddings jako dane wyjściowe. Następnie wrzuca je do wektorowej bazy danych i używa semantycznej wyszukiwarki by znaleźć podobną muzykę.J.” - JAY-Z . (BACK TO TOP)
Hot Keys, Scalability, and the Zipf Distribution the : so hot right now. MathJax = { tex: {inlineMath: [['$', '$'], ['\(', '\)']]} }; Does your distributed database (or microservices architecture, or queue, or whatever) scale ? It's a good question, and often a relevant one, but almost impossible to answer. To make it a meaningful question, you also need to specify the workload and the data in the system.01% chance your name is Blaise or Annabella. City sizes, maybe. For example
Learn how to migrate from Postgres to MySQL, Postgres vs MySQL incompatibilities, and more. Read the full story (BACK TO TOP)
TL; DR: We’re announcing a new open source type checker for Hack, called Hakana. Slack launched in 2014, built with a lot of love and also a lot of PHP code. We started migrating to a different language called Hack in 2016. Hack was created by Facebook after they had struggled to scale their operations […] The post Hakana: Taking Hack Seriously appeared first on Slack Engineering . (BACK TO TOP)
https://www.timescale.com/blog/
Learn more about PostgreSQL in this episode of Timescale Timeout: how it was created, its use cases, behind-the-scenes stories, and starter (to more advanced) tips. (BACK TO TOP)
Tech is increasingly divorced from the real economy thanks to the COVID hangover and Apple's App Tracking Transparency (BACK TO TOP)
At Dropbox, we store data about how people use our products and services in a Hadoop-based data lake. Various teams rely on the information in this data lake for all kinds of business purposes—for example, analytics, billing, and developing new features—and our job is to make sure that only good quality data reaches the lake. Our data lake is over 55 petabytes in size, and quality is always a big concern when working with data at this scale. Both have their problems. 🙂 Simple enough? Yes. (BACK TO TOP)
(fyi, here’s the code for everything I built below, you can play around with it in Patterns Studio as well.) (BACK TO TOP)
https://buttondown.email/hillelwayne
I spent the past few weeks thinking about complexity and poking dead birds and stuff, but now that the March TLA+ workshop is available (use C0MPUT3RTHINGS for 15% off!), I’m back in teacher mode and making workshop improvements. 1 TLA+ is intended for finding flaws in software designs. But what else can we do with it? Creative Misuse is the use of a tool in an unintended way. For example, if you use a screwdriver to pry something open, or a book as a monitor stand.. LET set == SUBSET (1....... (BACK TO TOP)
Developing software in an IDE like CodeSandbox requires access to many on-prem or cloud resources, from package and container image registries to databases. When you’re using CodeSandbox for remote development, you’ll want to access those resources securely and with the lowest possible latency — even if they’re behind a firewall or don’t have public IP addresses. Network admins can generate a key from the Keys page of the admin console. (BACK TO TOP)
https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast
In this "Quick Thinks" episode, host Matt Abrahams interviews ChatGPT, an AI natural language processing chatbot, about its purpose, sources of information, ethical considerations, and the importance of human communication skills. To produce this episode, Matt typed his questions to ask ChatGPT, then recorded them in the studio. Producers then used Descript Overdub to "read" ChatGPT's responses. Seuss rhyme. ChatGPT provides advice on deep breathing, being confident, and speaking with pride. (BACK TO TOP)
We need to talk about how we talk about AI progress (BACK TO TOP)
http://muratbuffalo.blogspot.com/
This paper appeared in VLDB2022 and is a good followup to our TPC-E vs TPC-C post . The paper investigates the following question: Many articles compare to prior works under certain settings, but how much of their conclusions hold under other settings? Their methodology is as follows. They used TPC-C and YCSB benchmarks as they are most widely used. They reproduced and evaluated 11 work (see Table 1). They make some recommendations as to how to proceed for evaluation of future systems work.e.g. (BACK TO TOP)
span { padding: 0 !important; } Hello! I was trying to write about floating point yesterday, and I found myself wondering about this calculation, with 64-bit floats: >>> 0.1 + 0.2 0.30000000000000004 I realized that I didn’t understand exactly how it worked. I mean, I know floating point calculations are inexact, and I know that you can’t exactly represent 0.1 in binary, but: there’s a floating point number that’s closer to 0.3 than 0.30000000000000004 ! So why do we get the answer 0.3 ) and 0. (BACK TO TOP)
Learn from Retool infrastructure engineer Anna Yan why and how Retool moved our CI workloads to Buildkite using Kubernetes. (BACK TO TOP)
Note : This article is also available in Korean . Normally, when you navigate to your bank’s website you have little reason to worry about impersonations. The browser takes care of verifying that you are really connected to the right server, and that your connection is safely encrypted. It will indicate this by showing a lock icon in the address bar. So even if you are connected to a network you don’t trust (such as open WiFi), nothing can go wrong. And it will refuse connecting.0.0.0.0.0.0. (BACK TO TOP)
https://maximumeffort.substack.com
In which I discuss Reddit engagement statistics, angry moderators, Dunbar's number, and dive headfirst into pseudoscience. (BACK TO TOP)
End of week debrief, weekly business review, monthly learning sessions, and quarter review. (BACK TO TOP)
#508 – February 06, 2023 Contracts you should never sign The good news is that contracts are not set in stone, they are usually open to negotiation until they're signed, and even after signing, you have a chance to change something if you're on good terms with the counterparty. Up to 2M API requests for free. Asynchronous computing at Meta: Overview and learnings Here's what we've learned from making architecture changes to Meta’s event driven asynchronous computing platform. (BACK TO TOP)
I’m a professional computer programmer, but I don’t often do all that much computer programming. Instead I spend much of my time futzing around with config files, other people’s frameworks, and other people. This makes it easy to forget how much fun it is to write a long program that truly interests you and watch it do something a little bit astonishing. I write a lot of words in my spare time, but rarely any code. But choosing a personal project is hard. I chose to write Gamebert in Go.e. (BACK TO TOP)
https://eli.thegreenplace.net/
A higher-order function is a function that takes other functions as arguments, or returns a function as its result. Higher-order functions are an exceptionally powerful software design tool because they can easily create new abstractions and are composable. In this post I will present a case study - a set of functions that defines an interesting problem domain. One of my all-time favorite programming books is Peter Norvig's PAIP . In section 6. First, some prerequisites.core/f15 paip. (BACK TO TOP)
https://www.tbray.org/ongoing/ongoing.atom
A lot has changed since the initial launch of our basemap in late 2020. We’re Meta now, but our mission remains the same: Giving people the power to build community and bring the world closer together. Across Meta, our family of applications (Facebook, Instagram, WhatsApp, among others) are using our basemap to connect people through [...] Read More... The post Improving Meta’s global maps appeared first on Engineering at Meta . (BACK TO TOP)
Facebook for iOS (FBiOS) is the oldest mobile codebase at Meta. Since the app was rewritten in 2012, it has been worked on by thousands of engineers and shipped to billions of users, and it can support hundreds of engineers iterating on it at a time. After years of iteration, the Facebook codebase does not [...] Read More... The post The evolution of Facebook’s iOS app architecture appeared first on Engineering at Meta . (BACK TO TOP)
In reality, people are coming back to our offices not to ‘ideate,’ but for the kinds of human connections I experienced [on site].” Nazareth Vartanian, Director of Collaboration Technologies at Meta talks about promoting collaboration and social interaction in the post-pandemic workplace. (BACK TO TOP)
Making augmented reality accessible (BACK TO TOP)
Linux is one of the most popular operating systems. It has a powerful command-line interface that allows various commands to be passed as instructions to be executed by the computer. The echo command is one of the most commonly used Linux commands. This tutorial will introduce you to the Linux echo command, go over its options and their usage, and show you how you can use it. What Is the echo Command? echo is a built-in Linux command that is used to display the text passed in as an argument. 2. (BACK TO TOP)
The modern software delivery life cycle is filled with microservices packed into containers. Containers can lead to more flexible and scalable applications but often at the cost of additional complexity. Your application probably consists of many microservices that are built and deployed independently. Each microservice may have its own development and deployment cycle, and the dependencies between services can be complex. This is where container orchestrators can help. (BACK TO TOP)
A few days ago I published a short post about two bugs I wrote while developing the C++ external scanner for my TLA⁺ tree-sitter grammar. Reactions were mixed! Many people were supportive, but there were of course the usual drive-by claims by developers that the bugs were trivial, they would’ve found & fixed them inside of 20 minutes, and I was laughably incompetent for having written them in the first place. (BACK TO TOP)
Here’s a short post about two bugs I wrote while writing C++ code for the external scanner of my TLA⁺ tree-sitter grammar. External scanners use handwritten C or C++ code to parse the non-context-free parts of your language. I’ll try not to dump on C++ too hard but both of the bugs are highly ridiculous and exemplify why I hope to write as little of the language as possible for the rest of my career. (BACK TO TOP)
https://www.ardanlabs.com/blog/
Introduction I was hesitant to try Rust at first because the syntax from afar discouraged me and the comparisons people made between C++ and Rust reminded me of the days I spent hours trying to build C++ github projects that relied on GCC to compile. However, after trying Rust, my opinion of the language has drastically changed. (BACK TO TOP)
Introduction In episode 1, Miki had two functions that performed the similar operation, but returned different types. To refactor this, Miki rewrote both functions as a generic function that allowed him to specify the type to be returned during invocation. In some cases, the compiler may not recognise a type, thus, Miki gives a few pointers on manually telling a generic function which type to use. (BACK TO TOP)
For a long time, I found the micromanager CEO archetype very frustrating to work with. They would often pop out of nowhere, jab holes in the work I had done without understanding the tradeoffs, and then disappear when I wanted to explain my decisions. In those moments, I wished they would trust me based on my track record of doing good work. As I spoke with industry peers, I was surprised to realize that the CEO-at-a-distance does exist. In fact, they were quite frustrated. (BACK TO TOP)
Recently, I had a chat with a friend who was frustrated by their company culture. They’d been pushing the company to operate with more urgency, but didn’t feel like it was landing. “How do we,” they wondered, “get the team to recognize that urgency is essential to our success?” They were convinced this was an internal cultural problem, mentioning the classic, “Culture eats strategy for breakfast” quote often attributed to Peter Drucker, although probably incorrectly . (BACK TO TOP)
Learn how recent indicators of stock draws and demand give clues of what to expect in Q1 fuel market movement. The post Fuel Prices Ride the Waves of Market Fears and Disruptions appeared first on DTN . (BACK TO TOP)
Keep your customers happy with automated alerts regarding supply events. Read the brochure to learn more. The post End-to-end visibility into supply events appeared first on DTN . (BACK TO TOP)
Many transportation departments are battling winter weather with a workforce shortage and increasing environmental concerns about road treatment. The post Road Managers Face Multiple Challenges, Including Winter Weather appeared first on DTN . (BACK TO TOP)
A picture of my home office in Malibu went viral last week. Some two million people gawked at that lovely Catalina Island-facing view that forms the background for work when I'm there. Here's another shot of that same office from the early morning: It really is my dream office. But at the same time, it's also just an office, and the most enjoyable part of that is the creative work that happens on the 27" glass rectangle. The second best things are very, very expensive. (BACK TO TOP)
Disappointment occurs when expectations don’t match reality. And our expectations for software quality are profoundly unrealistic. Thus, lots of people are continuously disappointed — even enraged — by software bugs. They shouldn’t be. The only reliable, widely used way to ensure impeccable software quality is to write less software that does less stuff, and then spend eons honing that tiny lot. Software development doesn’t work like that. Bugs are an inevitable byproduct of writing software. (BACK TO TOP)
Just a couple of months ago, I wrote an analysis of why I believed we were entering the waning days of DEI's dominance . I looked at four factors: 1) the likely judicial defeat of affirmative action in universities, 2) the disintegration and scandalization of BLM, 3) the loss of Twitter as an effective woke policing mechanism, and 4) finally the coming mass layoffs in tech. Now comes the proof that we've indeed seen the corporate peak. (BACK TO TOP)
A couple months ago, we launched Profiling in alpha for users on Python and Node.js SDKs — today, we’re moving Profiling for Python and Node… (BACK TO TOP)
This is part 2 of a 3-part series on profiling. If you’re not yet familiar with the what profiling is, check out the first part in our… (BACK TO TOP)
The performance of your app matters. From ensuring a good user experience to retaining users, performance makes a difference in your app’s… (BACK TO TOP)
https://www.microsoft.com/en-us/security/blog/
Vasu Jakkal invites you to join us at the Microsoft Secure digital event to discover exciting product announcements and what an AI-driven future means for cybersecurity. The post Learn what an AI-driven future means for cybersecurity at Microsoft Secure appeared first on Microsoft Security Blog . (BACK TO TOP)
This is the first in an ongoing series exploring some of the most notable cases of the Microsoft Detection and Response Team (DART), which investigates cyberattacks on behalf of our customers. The Cyberattack Series takes you behind the scenes for an inside look at the investigation and share lessons that you can apply to better protect your own organization. The post Solving one of NOBELIUM’s most novel attacks: Cyberattack Series appeared first on Microsoft Security Blog . (BACK TO TOP)
Introducing Adaptive Protection in Microsoft Purview—People-centric data protection for a multiplatform world
Learn how machine learning in Microsoft Purview enables people-centric data protection and saves your security teams time. The post Introducing Adaptive Protection in Microsoft Purview—People-centric data protection for a multiplatform world appeared first on Microsoft Security Blog . (BACK TO TOP)
Authorities in the United States and United Kingdom today levied financial sanctions against seven men accused of operating "Trickbot," a cybercrime-as-a-service platform based in Russia that has enabled countless ransomware attacks and bank account takeovers since its debut in 2016. The U.S. Department of the Treasury says the Trickbot group is associated with Russian intelligence services, and that this alliance led to the targeting of many U.S. companies and government entities. (BACK TO TOP)
KrebsOnSecurity will likely have a decent amount of screen time in an upcoming Hulu documentary series about the 2015 megabreach at marital infidelity site Ashley Madison. While I can't predict what the producers will do with the video interviews we shot, it's fair to say the series will explore tantalizing new clues as to who may have been responsible for the attack. (BACK TO TOP)
Julius "Zeekill" Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more than 22,000 patients online, was arrested this week in France. A notorious hacker convicted of perpetrating tens of thousands of cybercrimes, Kivimäki had been in hiding since October 2022, when he failed to show up in court and Finland issued an international warrant for his arrest. (BACK TO TOP)
Posted by Ted White and Ofer Naaman, Staff Research Scientists, Google Quantum AI The Google Quantum AI team is building quantum computers with superconducting microwave circuits, but much like a classical computer the superconducting processor at the heart of these computers is only part of the story. An entire technology stack of peripheral hardware is required to make the quantum computer work properly. We therefore cannot afford to average the signal over a longer time to reduce the noise. (BACK TO TOP)
Posted by Jinsung Yoon and Sercan O. Arik, Research Scientists, Google Research, Cloud AI Team Anomaly detection (AD), the task of distinguishing anomalies from normal data, plays a vital role in many real-world applications, such as detecting faulty products from vision sensors in manufacturing , fraudulent behaviors in financial transactions , or network security threats . Depending on the availability of the type of data — negative (normal) vs.e. We consider methods with both shallow (e.g.g. (BACK TO TOP)
Posted by Sanjiv Kumar, VP and Google Fellow, Google Research (This is Part 4 in our series of posts covering different topical areas of research at Google. You can find other posts in the series here.) The explosion in deep learning a decade ago was catapulted in part by the convergence of new algorithms and architectures, a marked increase in data, and access to greater compute. But, it is unclear precisely how the “world knowledge” of such models interacts with the presented context.e.e.g.e. (BACK TO TOP)
Posted by Zvika Ben-Haim and Omer Nevo, Software Engineers, Google Research As global temperatures rise , wildfires around the world are becoming more frequent and more dangerous. Their effects are felt by many communities as people evacuate their homes or suffer harm even from proximity to the fire and smoke. Our wildfire tracker was recently expanded . These boundaries are shown for large fires in the continental US, Mexico, and most of Canada and Australia.e.85μm band.9 μm and 11.g.e. (BACK TO TOP)
Today we're announcing Wildebeest, an open-source, easy-to-deploy ActivityPub and Mastodon-compatible server built entirely on top of Cloudflare's Supercloud. (BACK TO TOP)
Today’s post is a little different. It’s about a single customer’s website not working correctly because of incorrect action taken by Cloudflare. (BACK TO TOP)
Administrators can now use Gateway traffic egress policies to determine which egress IPs are used when. (BACK TO TOP)
Today we’re adding more flexibility to HTTP alerting, enabling customers to customize the types of activity they’re alerted on and how those alerts are organized. (BACK TO TOP)
A quick look at the history of building web apps, followed by a discussion of htmx and how it compares to both modern and traditional ways of building. (BACK TO TOP)
Worlds are colliding! This week we join forces with the hosts of the MLOps.Community podcast to discuss all things machine learning operations. We talk about how the recent explosion of foundation models and generative models is influencing the world of MLOps, and we discuss related tooling, workflows, perceptions, etc. (BACK TO TOP)
OpenAI's new text classifier, teach yourself CS, programming philosophies are about state, you might not need Lodash & overrated scalability (Changelog News)
OpenAI’s working on an AI classifier trained to distinguish between AI-written and human-written text, Oz Nova and Myles Byrne created a guide to teach yourself computer science, Charles Genschwap recently realized that all the various programming philosophies can be boiled down into a simple statement about how to work with state, you probably don’t need Lodash or Underscore anymore & Waseem Daher thinks scalability is overrated. (BACK TO TOP)
A deep dive into Qwik, how it makes your apps fast by default, and the carefully calibrated amount of “magic” that makes it uniquely powerful. (BACK TO TOP)
The collaboration includes Amazon funding for faculty research projects, with an initial focus on machine learning and natural-language processing. (BACK TO TOP)
How her background helps her manage a team charged with assisting internal partners to answer questions about the economic impacts of their decisions. (BACK TO TOP)
Parmida Beigi, an Amazon senior research scientist, shares a lifetime worth of experience, and uses her skills to help others grow into machine learning career paths. (BACK TO TOP)
Methods for controlling the outputs of large generative models and integrating symbolic reasoning with machine learning are among the conference’s hot topics. (BACK TO TOP)
Learn how physics and computer science influence each other and about the importance of the scientific perspective when it comes to quantum technology. (BACK TO TOP)
In today's IPv6 Buzz podcast we discuss IPv6 Neighbor Discovery and some of the operational issues that can happen when configuring and operating IPv6, and what can help listeners understand and resolve those issues. The post IPv6 Buzz 119: Operational Issues With IPv6 Neighbor Discovery appeared first on Packet Pushers . (BACK TO TOP)
On today's Day Two Cloud podcast we talk about Infrastructure as Code (IaC) and software practices you might want to put in place for the parts of your team who know what they're doing with infrastructure but may not be familiar with developer practices that can help make code more reliable and operational processes more repeatable. Our guest is author Rosemary Wang. The post Day Two Cloud 181: Implementing Patterns And Practices For Infrastructure as Code appeared first on Packet Pushers . (BACK TO TOP)
Network Break 416: Ericsson Flogs 5G Network Slicing For Laptops; Microsoft Loads Work Drudgery Onto ChatGPT
On this week's Network Break we examine Ericsson's push for 5G network slicing on laptops, Microsoft injecting ChatGPT into Teams to do the grunt work, financial results from Juniper and Amazon, and more tech news. The post Network Break 416: Ericsson Flogs 5G Network Slicing For Laptops; Microsoft Loads Work Drudgery Onto ChatGPT appeared first on Packet Pushers . (BACK TO TOP)
Today on the Tech Bytes podcast we’re talking about cloud migration and operating in a multi-cloud environment. We’re sponsored by VMware and we’re speaking with Expedient, a VMware partner. Expedient is also a cloud service provider and runs 14 data centers across the US. Our guest is Bryan Smith, CEO at Expedient. The post Tech Bytes: Enabling Smart Cloud Migration With VMware And Expedient (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)
Today's Heavy Networking is a forward-looking episode about semantic networking. Semantic networking aims to make decisions on how to route packets based on more than just the destination address and give network operators more routing choices based on considerations such as bandwidth, cost, performance, application type, and so on. The post Heavy Networking 664: Semantic Networking – Science Project Or Networking’s Future? appeared first on Packet Pushers . (BACK TO TOP)
Today's links Copyright won't solve creators' Generative AI problem: The machine-learning monkey's paw. Hey look at this: Delights to delectate. Even though the claims about "AI" are overblown and overhyped, creators are right to be alarmed. Their bosses would like nothing more than to fire them and replace them with pliable software. Creative labor markets are primarily regulated through copyright: the exclusive rights that accrue to creators at the moment that their works are "fixated.medium. (BACK TO TOP)
Today's links The Collective Intelligence Institute: Asking more than 'what technology does' and demanding to know who it does it FOR and who it does it TO. Hey look at this: Delights to delectate." https://locusmag.com/2022/01/cory-doctorow-science-fiction-is-a-luddite-literature/ If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog: https://pluralistic." We get to choose.wired. II." II. (BACK TO TOP)
Today's links Bruce Schneier's "A Hacker's Mind": Thinking about tactics AND power. This day in history: 2003, 2008, 2018, 2022 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Bruce Schneier's "A Hacker's Mind" (permalink) A Hacker's Mind is security expert Bruce Schneier's latest book, released today. https://wwnorton. https://www.schneier.com/wp-content/uploads/2016/02/restaurants-san-jose.schneier.schneier.com/FidgetProtocol.archive.com. (BACK TO TOP)
Today's links When Facebook came for your battery, feudal security failed: A tale of whistleblowers, security through obscurity, and binding arbitration. Hey look at this: Delights to delectate. Hayward refused, and Facebook fired him, and he sued: https://nypost.com/2023/01/28/facebook-fires-worker-who-refused-to-do-negative-testing-awsuit/ Hayward balked because he knew that among the 1. It turns out if you tell your boss, 'No, that’s illegal,' it doesn’t go over very well.vercel.archive.loc. (BACK TO TOP)
Today's links Higher interest rates increase both the monetary supply and inflation: It takes a lot of motivated reasoning to believe otherwise. Hey look at this: Delights to delectate. This day in history: 2003, 2018, 2022. With less borrowing, there's less expansion, which leads to layoffs that lower the spending power of workers, which means that there are fewer dollars chasing the same goods, which means that prices go down. Q.E.D." https://www.nybooks.g.tni.cambridge.eff.bloomberg.bbc.co. (BACK TO TOP)
This affects the individual developer writing insecure code, the engineering team blindly trusting their dependencies, and the organization thinking that their best bet is to roll their own security controls. The post Three layers to secure a software development organization appeared first on Stack Overflow Blog . (BACK TO TOP)
CI/CD needs a CM—continuous merge—to get the SDLC moving smoothly. The post Engineering’s hidden bottleneck: pull requests appeared first on Stack Overflow Blog . (BACK TO TOP)
The home team discusses why it seems like everybody needs subtitles now, the AI that generates music from text, and a list of open-source data engineering projects for you to contribute to. The post The AI that writes music from text (Ep. 535) appeared first on Stack Overflow Blog . (BACK TO TOP)
We chat with Dr. Jeannette (Jamie) Garcia, Senior Research Manager of Quantum Applications and Software at IBM Quantum, about their 433 qubit quantum computer and what the real life applications of quantum computing are today. The post The nature of simulating nature: Q&A with IBM quantum computing research appeared first on Stack Overflow Blog . (BACK TO TOP)
Less JS mess, cows vs. tornadoes, and PNG The post The Overflow #163: Most Loved vs. most questions appeared first on Stack Overflow Blog . (BACK TO TOP)
A seven-point manifesto for driving lasting innovation. The post Why developer experience is the key to better software, straight from the OCTO’s mouth (Ep. 534) appeared first on Stack Overflow Blog . (BACK TO TOP)
https://cloud.google.com/blog/
Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more. Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here: Google Cloud blog 101: Full list of topics, links, and resources . Read more here . But poor data quality can lead to inefficient processes and possible financial losses. Learn more . Read more . Read more .y.14.0. (BACK TO TOP)
Health-ISAC and Google Cloud partner to build more resilient healthcare, one threat indicator at a time
Google Cloud is committed to helping healthcare and life sciences organizations defend themselves from threats that disrupt their ability to care for patients. The pandemic showed how vulnerable this industry is to attacks , and the real-life impacts that shutting down hospital systems and affecting drug makers can have on patients and families. Today, we’re announcing the general availability of our next investment in this community.wagtailcore.rich_text.chronicle. (BACK TO TOP)
Security has become a critical component in every modern application and platform today. As IT admins try to implement security policies required to protect applications across distributed platforms, they often run into issues such as the lack of effective policy enforcement and lack of visibility into the policy violations. Anthos automates policy and security for Kubernetes clusters. Anthos Config Sync reconciles the state of clusters with one or more Git repositories. (BACK TO TOP)
Scott Penberthy lost his mom to cancer — he’s now committed to using his passion for AI to advance healthcare
Editor’s note : Scott Penberthy is the Director of Applied AI in Google Cloud's Office of the CTO (OCTO), a team that works with some of Google Cloud’s largest customers to solve their most complex business problems and advise Google on emerging trends across industries, geographies, and technology. A self-described student of deep learning, he's working with healthcare providers (and as a side project, NASA) on how we can better understand both life and the universe... Read Article (BACK TO TOP)
Beany builds on Google Cloud to revolutionize accounting and financial planning for small businesses
Many people start a small business that aligns with their passions, but soon discover the day-to-day running of a business is very different than anticipated. Dealing with accounting, finance, and other daily activities can quickly overwhelm even the most promising of new businesses. Recognizing the unique challenges facing small businesses, we founded Beany . We prepare financial statements, minimize tax and keep an eye that our clients are paying the right amount at the right time. (BACK TO TOP)
Running a lot of genomic pipelines can be challenging. Adding GPUs to the solution is harder. In this blog, we are presenting the whole solution of running multiple jobs with GPU and Batch. As Nvidia Clara Parabricks is available in the Google Cloud Platform Marketplace, you can easily spin up a single VM with Parabricks tools to help with your genomics pipeline workloads. A Parabricks VM allows you to run individual workflow(s) manually. Batch is the solution addressing the problem.nvidia.8.0. (BACK TO TOP)
Last year at Google I/O, we announced the preview of Immersive Stream for XR , which leverages Google Cloud GPUs to host, render, and stream high-quality photorealistic experiences to millions of mobile devices around the world. Today, we are excited to announce that the service is now generally available for Google Cloud customers. What’s new with GA With this latest product milestone, Immersive Stream for XR now supports content developed in Unreal Engine 5.0 .wagtailcore.rich_text.google.0. (BACK TO TOP)
State and local agencies witnessed how the pandemic transformed the way government works - creating remote and hybrid work opportunities where they did not exist before, digitizing workforce services across the country, and increasing our world’s reliance on technology. These changes continue to impact how our country’s workforce operates today. In fact, an estimated 50% of all employees will need to be retrained or reskilled by 2025 as adoption of technology increases. Yolo County, Calif. (BACK TO TOP)
Introduction Developing in SQL poses significant problems when compared to other languages and frameworks. It's not easy to reuse statements across different scripts, there's no way to write tests to ensure data consistency, and dependency management requires external software solutions. Developers will typically write thousands of lines of SQL to ensure data processing occurs in the correct order. Google Cloud offers Dataform and SQLX to solve these challenges.wagtailcore.rich_text.sqlx . 2.. (BACK TO TOP)
Harden your Kubernetes clusters and monitor workload compliance at scale with new PCI DSS policy bundle
PCI DSS is a set of network security and business best practices guidelines adopted by the PCI Security Standards Council to establish a “minimum security standard” to protect customers’ payment card information. Google Cloud undergoes a third-party audit to certify individual products against the PCI DSS at least annually, and customers can build off of these attestations to measure their applications’ compliance. The PCI DSS v3.2. The PCI DSS v3.2. Requires a valid app.kubernetes.2.3.2.14. 1. (BACK TO TOP)
Competing and staying relevant in an economy that has almost become digital-first overnight, required organizations to rethink their API strategy, and in many cases, a hybrid cloud approach. As we uncovered in our 2022 research into API usage , 59% of respondents were planning to increase their hybrid cloud adoption in the next 12 months. But operating APIs consistently in a hybrid cloud environment is easier in theory than in practice. This is where testing comes in handy.yaml file. (BACK TO TOP)
Introduction In our discussions with technology leaders from around the world for – The Digital Crunch Time: 2022 State of APIs and Applications – two themes emerged #1 Cloud — and hybrid cloud specifically — is becoming a driving factor of success with 59% of respondents saying they were looking to increase their hybrid cloud adoption within the next 12 months. #2 82% of organizations with a mature API strategy and higher API adoption reported increased efficiency, collaboration, and agility. (BACK TO TOP)
APIs power every digital interaction we experience today – from ordering your favorite coffee on your mobile device, to checking the live scores on your sports app, to even reading this blog on your device. With the growing surface of interactions powered by APIs, even the surface area for a potential attack is increasing. Securing your APIs requires a prudent strategy and a multi-layered approach . Before we dive deeper into the topic, let’s start with a few basic concepts.,).0 or mutual SSL. (BACK TO TOP)
Google Cloud Firewall is a scalable, built-in service with advanced protection capabilities that helps enhance and simplify security posture, and implement zero trust networking, for cloud workloads. Its fully-distributed architecture provides micro-segmentation and granular control independent of network structure. These features can now be activated through the Cloud Console, Command Line Interface , and API. This new structure improves upon the previous VPC firewall rules structure ... (BACK TO TOP)
Google Cloud Operations Suite provides support for hundreds of metrics across various services. In addition to these predefined metrics that are available, you can always report custom metrics from your applications. One of the common requests that I have heard from organizations is to look for patterns of text in their application logs and report data on that. Visualize the metric via a custom Dashboard in Google Cloud Monitoring. Let’s get started on this journey.helloworld.slf4j.slf4j.ui.web. (BACK TO TOP)
As a business leader today, you’re juggling a lot of priorities. You’re focused on improving productivity, protecting your company against risk, and reducing operational costs, just as you’ve always done. But you also have new, big challenges to address, from climate change to employee burnout and ongoing inflation. Complex challenges often reveal new opportunities, and business leaders can drive sustainable value by embracing the tension and developing a multi-front strategy.wagtailcore.V. (BACK TO TOP)
Today we announce new Dataplex features: automatic data quality (AutoDQ) and data profiling , available in public preview. Dataplex is an intelligent data fabric that provides a way to manage, monitor, and govern your distributed data at scale. AutoDQ offers automated rule recommendations, built-in reporting, and serveless execution to construct high-quality data. Data profiling delivers richer insight into the data by identifying its common statistical characteristics. Automation at scale .g. (BACK TO TOP)
Bulletin by Jakub Mikians