Bulletin for Friday, 03 Mar 2023
7 days digest
DTN (1)
Metadata (1)
Julia Evans (1)
Stay SaaSy (1)
Stratechery by Ben Thompson (1)
The CircleCI Blog Feed - CircleCI (1)
Eugene Yan (1)
Almost Secure (1)
Kuba Filipowski (1)
Weaveworks (1)
Think Fast, Talk Smart: Communication Techniques (1)
Go (Golang) Programming Blog - Ardan Labs on (1)
frankdenneman.nl (2)
Replit Blog (2)
Patterns Blog (2)
Computer Things (2)
- How the 8086 processor determines the length of an instruction
- Reverse-engineering the ModR/M addressing microcode in the Intel 8086 processor
Retool Blog (3)
- Building a Custom Amazon EC2 Instance Admin Panel for DevOps with Retool
- Building an SQL Server Admin Panel in Retool
- Building a Snowflake admin panel in Retool
- Hackers Claim They Breached T-Mobile More Than 100 Times in 2022
- When Low-Tech Hacks Cause High-Impact Breaches
- Who’s Behind the Botnet-Based Service BHProxies?
Earthly Blog (3)
- Amazon and Columbia announce 2023 CAIT Fellows
- Jonathan Toner’s hunt for hard questions took him from Antarctica to Amazon
- Optimizing AI/ML workloads for sustainability
The Full Feed - All of the Packet Pushers Podcasts (4)
- Day Two Cloud 184: Think Multiplatform, Not Multicloud
- Tech Bytes: ThousandEyes Enhances Data Correlation With OpenTelemetry (Sponsored)
- Network Break 419: HPE Buys Athonet For Private 5G; Exit Public Cloud, Save Millions?
- Heavy Networking 667: Broadcom’s NetOps Delivers End-User Visibility Into SD-WAN (Sponsored)
- Oxy is Cloudflare's Rust-based next generation proxy framework
- How we built an open-source SEO tool using Workers, D1, and Queues
- How Rust and Wasm power Cloudflare's 1.1.1.1
- ROFL with a LOL: rewriting an NGINX module in Rust
Blog – Hackaday (4)
- Never Walk Uphill Again With This Motorized Sled
- ATtiny85 Automates Your Smartphone
- Hacker Hotel 2023: Back Again!
- A Look Inside Bicycle Gearboxes
Pluralistic: Daily links from Cory Doctorow (4)
- Pluralistic: VW wouldn't locate kidnapped child because his mother didn't pay for find-my-car subscription (28 Feb 2023)
- Pluralistic: Podcasting "Twiddler" (27 Feb 2023)
- Pluralistic: Dow promised to turn sneakers into playground surfaces, then dumped them in Indonesia (26 Feb 2023)
- Pluralistic: This is your brain on fraud apologetics (24 Feb 2023)
Sentry Blog RSS (4)
- The New APM: Actionable, Affordable, and Actually Built For Developers
- Making Performance Monitoring More Actionable with Sentry
- Treat Performance Like A Feature
- Get More Context about your Cloud Services with Sentry
Timescale Blog (4)
- Downsampling in the Database: Processing Data With Ruby or SQL?
- A Guide to PostgreSQL Views
- How Ndustrial Is Providing Fast Real-Time Queries and Safely Storing Client Data With 97 % Compression
- Do More on AWS With Timescale Cloud: Build an Application Using Lambda Functions in Python
Google AI Blog (5)
- Distributed differential privacy for federated learning
- Teaching old labels new tricks in heterogeneous graphs
- Datasets at your fingertips in Google Search
- Google Research, 2022 & beyond: Research community engagement
- A vision-language approach for foundational UI understanding
- The simplest thing that could possibly work
- Introducing MRSK
- When prophecy fails
- Don't be fooled by serverless
- Get out of momentum's way
- Kaizen! Embracing change 🌟 (Ship It! #90)
- You’re just a devcontainer.json away (The Changelog #529)
- Success (and failure) in prompting (Practical AI #213)
- Stack Overflow's architecture, Lobsters' killer libraries, Linux is ready for modern Macs, what to expect from your framework & GoatCounter web analytics (Changelog News)
- Into the Fediverse (The Changelog #528)
- Frontend Feud: CSS Podcast vs @keyframers (JS Party #264)
- Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
- New research, tooling, and partnerships for more secure AI and machine learning
- SEC cyber risk management rule—a security and compliance opportunity
- The Microsoft Intune Suite fuels cyber safety and IT efficiency
- Microsoft Security Experts discuss evolving threats in roundtable chat
- 5 reasons to adopt a Zero Trust security strategy for your business
Simon Willison's Weblog: Blogmarks (7)
- OpenAI: Introducing ChatGPT and Whisper APIs
- Indirect Prompt Injection on Bing Chat
- New AI game: role playing the Titanic
- Tech's hottest new job: AI whisperer. No coding required.
- Introducing LLaMA: A foundational, 65-billion-parameter large language model
- djngo.com: Portable Django
- Using Datasette in GitHub Codespaces
Towards Data Science - Medium (7)
- Higher Precision Imaging of Espresso Baskets
- Having Trouble Understanding Quantum Machine Learning?
- Performance Estimation Techniques for Machine Learning Models
- Using PyGWalker to Enhance Your Jupyter Notebook EDA Experience
- The One Page Data and Analytics Templates
- Natural Language Processing Is about More than Chatbots
- Python Assertions, or Checking If a Cat Is a Dog
- How Intuit democratizes AI development across teams through reusability
- New pricing for Stack Overflow for Teams
- The open-source game engine you’ve been waiting for: Godot (Ep. 542)
- Stop saying “technical debt”
- Why governments need open source more than ever
- The Overflow #166: Writing code for other people
- ML and AI consulting-as-a-service (Ep. 541)
TABS centralizes and automates your product allocations and credit, but did you know it can do a lot more? Discover how forecasting and enhanced credit modules give you greater control over your business The post Supercharge your fuel-selling operations appeared first on DTN . (BACK TO TOP)
While VR headsets have been with us for at least a decade, AR hardware barely exists today; indeed, the very components that will comprise the hardware scarcely exist, making it a truly zero-to-one innovation challenge. Meta’s Head of AR Glasses Hardware, Caitlin Kalinowski is helping to lead that charge. Kalinowski hails from Portsmouth, NH and studied mechanical [...] Read More... The post Meta’s head of AR hardware on the future of AR appeared first on Engineering at Meta . (BACK TO TOP)
https://www.tbray.org/ongoing/ongoing.atom
I managed the engineering team at Digg as we ran out of money, and were eventually acquired . It was an eye opening experience, and I learned a great deal about the reality and the optics of selling a company, particularly one with no money and a shrinking user base. Humbling was just the beginning. Since then, I’ve had the opportunity to evaluate a number of companies from the other side of the Mergers and Acquisitions (M&A) table. Documenting your acquisition thesis is extremely valuable.g.g. (BACK TO TOP)
https://eli.thegreenplace.net/
Ever since I switched this website to a static setup in 2014, I've been trying to simplify it even more. In 2018 I turned off Disqus comments , eliminating a large source of latency. Recently, an additional effort to reduce dependencies and be more self-contained led to the replacement of Google Analytics by a self-hosted OSS analytics solution. Overall, the process of setting this up didn't seem sufficiently simple to me - but I may have well overlooked something. OSS and written in Go .4.4.0.. (BACK TO TOP)
I’ve been doing lots of experiments with GPT , though I’ve only written about one until now… the more serious something is the harder it is to call it finished or identify the outcomes. Here I’ll describe something a bit lighter: world building, or specifically city building, with GPT . This post is for people who are interested in building interactive tools on top of GPT and want to see some of the things I’ve encountered and what I’ve found that is successful and what is still a challenge.g.g. (BACK TO TOP)
http://muratbuffalo.blogspot.com/
This paper is from SOSP'13. The Polyjuice paper, which we studied last week, built on the Silo codebase and commit protocol, which led me to read the Silo paper. Silo is a single-node multi-core in-memory database. It avoids all centralized contention points, including centralized transaction ID (TID) assignment. Logging and recovery is provided by linking periodically-updated epochs with the commit protocol. That is pretty impressive over 2013 hardware. That is also impressive.2.0. (BACK TO TOP)
https://www.hackerfactor.com/blog/
I can't believe it. Hacker Factor turns 20 years old today! I searched my blog and realized that I've never written about how I started down this path. Long story short: I got laid off from Hewlett-Packard (HP), took an interest in researching spammers, and started doing everything that HP had forbid me from doing. The longer version: Starting with spam I moved to Fort Collins in 1998. With a new location, I had a new internet service provider, Comcast. I didn't hand out my email addresses.e. K. (BACK TO TOP)
Recently I started using a Mac for the first time. The biggest downside I’ve noticed so far is that the package management is much worse than on Linux. Here’s what I’ve figured out so far! We’ll talk about how to: install packages with nix build a custom nix package for a C++ program called paperjam install a 5-year-old version of hugo with nix As usual I’ve probably gotten some stuff wrong in this post since I’m still pretty new to nix.nixos.17.9.1 .com . Put ~/.NAME That’s it.nixos.nixos.5... (BACK TO TOP)
In large organizations, culture is key. The values and habits of an organization, and what it rewards and punishes, are the background radiation driving towards discrete outcomes in a world of infinite possibility. Your culture is a living thing - it changes and adapts to new teammates, external forces, and the broader environment. And sometimes it gets sick; sometimes your culture gets a virus. Below we’ll work through examples of common culture viruses that can occur as companies grow..etc. E. (BACK TO TOP)
Listen now (51 min) | Latent Space Podcast Ep. 2: Why you are holding your GPUs wrong (BACK TO TOP)
Formula 1 has done an impressive job earning fans; the NBA should study it, because the pay TV bundle is slowly disintegrating (BACK TO TOP)
Collecting ground truth, data augmentation, cascading heuristics and models, and more. (BACK TO TOP)
Half a year after the LastPass breach started in August 2022, information on it remains sparse. It took until December 2022 for LastPass to admit losing their users’ partially encrypted vault data. This statement was highly misleading , e.g. making wrong claims about the protection level provided by the encryption. Despite many questions being raised, LastPass maintained strict radio silence since December. Until yesterday they published an article with details of the breach .g. (BACK TO TOP)
https://www.kubafilipowski.com/
AI alignement w wersji inżynieryjnej to próba otrzymania oczekiwanych rezultatów od systemu AI. Czyli program AI do generowania obrazów, gdy użytkownik wpisze “kot”, powinien wygenerować obraz kota. Jeśli generuje psa to nie działa. AI alignement w wersji filozoficznej to dywagacje na temat bezpieczeństwa stosowania technik AI. Na szczycie tych rozważań jest oczywiście dyskusja, na temat tego, czy AGI doprowadzi do zagłady ludzkości. Yudkowsky analizuje filozoficzny aspekt. Ładnie się palą. (BACK TO TOP)
#511 – February 27, 2023 Kubernetes Infrastructure At Medium How Medium uses Kubernetes to manage micro-services — a high-level view and introduction. Build custom internal tools using code within minutes (sponsor) Airplane is a developer platform for creating custom internal tools. You can build powerful workflows and UIs using scripts, queries, APIs, and more within minutes. Publicly hosted on the internet, serving HTML, CSS, JavaScript, images, etc over HTTP. See how OneSchema works. (BACK TO TOP)
Kubernetes Adoption Grows Across Multiple Environments Kubernetes adoption continues to expand, with 64% of organizations using it in production and 25% either piloting or evaluating it. As the de facto method for running containers at scale in production, Kubernetes is now being used by many prominent global enterprises to run their business applications in production. Furthermore, more than a third (35%) are using Kubernetes for Edge environments. (BACK TO TOP)
https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast
If we want healthier companies, schools, and teams associate professor of organizational behavior Adina Sterling says investing in the health of marginalized groups “can have enormous spillover effects for everyone.” Sterling is an organizational theorist and economic sociologist whose research explores how human relationships affect organizations and markets. As she says, “The outcomes that individuals, groups, and organizations experience have to do with the social networks that they have.gsb. (BACK TO TOP)
https://www.ardanlabs.com/blog/
Introduction In episode 4, Miki defined an enumerated type that satisfied Go’s fmt.Stringer interface. By implementing the fmt.Stringer interface, Miki can specify how his enumerators were printed within a formatted string and in this case, he expected the values to be displayed as a predetermined text value. Miki also pointed out how using the value of the method’s receiver within the Stringer method can result in a recursive loop. (BACK TO TOP)
https://engineering.linkedin.com/blog.rss.html
Based in Silicon Valley, Priya serves on LinkedIn Engineering’s Technical Program Management (TPM) team, supporting our large-scale, AI and Knowledge Graph programs. A mom of two and co-founder of a dance nonprofit, she spotlights for us the TPM specialty at LinkedIn, her transition from product manager to TPM, the transition from contractor to full-time, and the power of soft skills. My journey to LinkedIn started when I was working as a product manager in data analytics at a large corporation. (BACK TO TOP)
After working as a data scientist and AI engineer in Seoul, globetrotters Vasundhara and her husband decided to relocate to Dublin for a once-in-a-lifetime AI and machine learning (ML) opportunity at LinkedIn. (BACK TO TOP)
To troubleshoot a particular NUMA client behavior in a heterogenous multi-cloud environment, I needed to set up an ESXi7.0 environment. Currently, my lab is running ESXi 8.0, so I’ve turned to William Lams’ excellent repository of nested ESXi virtual appliances and downloaded a copy of the 7.0 u3k version. My physical ESXi hosts are equipped […] The post <strong>Simulating NUMA Nodes for Nested ESXi Virtual Appliances</strong> appeared first on frankdenneman.nl . (BACK TO TOP)
The 4th generation of the Intel Xeon Scalable Processors (codenamed Sapphire Rapids) was released early this year, and I’ve been trying to wrap my head around what’s new, what’s good, and what’s challenging. Besides those new hardware native accelerators, which a later blog post covers, I noticed the return of different memory speeds when using […] The post Sapphire Rapids Memory Configuration appeared first on frankdenneman.nl . (BACK TO TOP)
Last week we announced the Pro plan to speed up your development with Replit's AI tools and an even more powerful Workspace. Today we're expanding all of our paid plans to add the ability to use SSH to remotely access your Repls. HOW DO I GET STARTED? If you're subscribed to a paid plan, you'll notice a new "SSH" entry in the Tools section of the Workspace. WHY SSH? Replit offers a powerful and flexible coding environment and through Nix you can instantly access over 30,000 software packages. (BACK TO TOP)
From large-scale businesses to nonprofits to anyone on the Internet, Cloudflare aims to make developer applications faster, more secure and more reliable. Cloudflare also offers an entire suite of developer products to help build the fundamental pieces of their applications. With Replit, you can experience a streamlined onboarding experience and setup with just a few clicks. > "We've been hearing from our users that they want a way to deploy to Cloudflare Workers with Replit.example.repl.co.g. (BACK TO TOP)
Announcing Auto Code, Patterns' new conversational interface which allows you (BACK TO TOP)
The app that I built as part of this graph can be viewed and cloned here//studio.patterns.app/graph/sx5yykfi7u34ut7pvae4 (BACK TO TOP)
https://surfingcomplexity.blog
In my recent talk at the LFI conference, I referenced this quote from Karl Weick: I was reminded of that quote when reading a piece by the journalist Yair Rosenberg: Rosenberg notes that this particular story hasn’t gotten much widespread press, and his theory is that the attacks, as well as other uncovered antisemitic events, … Continue reading You can’t see what you don’t have a frame of reference for → (BACK TO TOP)
My talk from the recent Learning from Incidents in Software conference is now up. Unfortunately, the first few minutes were lost due to technical issues. You’ll just have to take my word for it that the missing part of my talk was truly astounding, a veritable tour de force. My slides are also available for … Continue reading My talk from the LFI conference → (BACK TO TOP)
https://buttondown.email/hillelwayne
I promised an update on the logic book today but I haven’t done a spite write in a while and oh boy a new one is just raring to go. Update is queued up to be sent out Monday. Anyway , the candidate for today is The Great Gaslighting of the JS Age . The author Jared White looks at the current spike in React Discourse and claims that the pro-React arguments are identical to last decade’s pro-Angular arguments. This means that pro-React people are gaslighting everyone else. Me: I forgot about that. (BACK TO TOP)
Hello everyone! It’s finally March, or at least close enough to March for my purposes. First thing, we’re a month off from April Cools ! April cools is a less-cringe version of April fools, where content creators like me publish content that is both genuine and totally out of genre . Last year I took a break from software engineering to write about microscopy . Other people wrote about singing church music , marathon food , and how to read rot13 . Just a heads up. We’ll skip this one today. ↩ (BACK TO TOP)
In this era of large language models (LLMs), monolithic foundation models, and increasingly enormous datasets, distributed training is a must, as both data and model weights very rarely fit on a single machine. However, distributed training in ML is complex and error-prone, with many hidden pitfalls that can cause huge issues in the model training… (BACK TO TOP)
This article was originally an episode of the MLOps Live, an interactive Q&A session where ML practitioners answer questions from other ML practitioners. Every episode is focused on one specific ML topic, and during this one, we talked to Michal Tadeusiak about managing computer vision projects. You can watch it on YouTube: Or listen to… (BACK TO TOP)
Learn about some of the latest enhancements we made to the Branching page in the PlanetScale dashboard. Read the full story (BACK TO TOP)
Vitess 16 is now generally available with updates to VDiff v2, VTOrc, MySQL compatibility, and more. Read the full story (BACK TO TOP)
Twitter user opdroid1234 remarked that they are getting more performance out of the ARM nodes than out of the Intel nodes on Amazon’s cloud (AWS). I found previously that the Graviton 3 processors had less bandwidth that comparable Intel systems. However, I have not done much in terms of raw compute power. The Intel processors have … Continue reading ARM vs Intel on Amazon’s cloud: A URL Parsing Benchmark (BACK TO TOP)
If you are programming in C++ using Microsoft tools, you can use the traditional Visual Studio compiler. Or you can use LLVM as a front-end (ClangCL). Let us compare their performance characteristics with a fast string transcoding library (simdutf). I use an up-to-date Visual Studio (2022) with the latest ClangCL component (based on LLVM 15). For … Continue reading Regular Visual Studio versus ClangCL (BACK TO TOP)
.hilite {cursor:zoom-in} a:link img.hilite, a:visited img.hilite {color: #fff;} a:hover img.hilite {color: #f66;} pre.microcode {font-family: courier, fixed; padding: 10px; background-color: #f5f5f5; display:inline-block;border:none;} pre.microcode span {color: green; font-style:italic; font-family: sans-serif; font-size: 90%;} The Intel 8086 processor (1978) has a complicated instruction set with instructions ranging from one to six bytes long. RNI tells the loader to run the next instruction. (BACK TO TOP)
.hilite {cursor:zoom-in} a:link img.hilite, a:visited img.hilite {color: #fff;} a:hover img.hilite {color: #f66;} pre.microcode {font-family: courier, fixed; padding: 10px; background-color: #f5f5f5; display:inline-block;} pre.microcode span {color: green; font-style:italic; font-family: sans-serif; font-size: 90%;} One interesting aspect of a computer's instruction set is its addressing modes, how the computer determines the address for a memory access. table.modrm .modrm .modrm .modrm .modrm . (BACK TO TOP)
Custom scripts and tools are a common way for DevOps professionals to manage resources within their infrastructure. These scripts, however can become challenging to run, share, scale, and maintain, particularly as the complexity of the infrastructure grows and the team size expands. In this blog post, we'll explore (BACK TO TOP)
This post was created in collaboration with Anshuman Bhardwaj . Microsoft SQL Server is a hugely popular SQL database. It's ACID compliant , making it an excellent choice for financial applications, while its optimistic concurrency model is good for large-scale applications with frequent writes, such as e-commerce platforms. However, MS (BACK TO TOP)
This post was written with help from Gaurav Thalpati . Since the advent of products like Snowflake, more and more teams are leveraging data warehouses to store critical business data. Often, various teams—marketing, customer success, operations—need to access and alter that data but aren't equipped (BACK TO TOP)
Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then convert that access into a cybercrime service that could be hired to divert any T-Mobile user's text messages and phone calls to another device. (BACK TO TOP)
Web hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source code, siphon customer and employee login credentials, and foist malware on customer websites. Media coverage understandably focused on GoDaddy's admission that it suffered three different cyberattacks over as many years at the hands of the same hacking group. (BACK TO TOP)
A security firm has discovered that a five-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies, which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible for operating the BHProxies service. (BACK TO TOP)
In Django, signals allow certain senders to inform a set of receivers that specific actions have occurred. Django signals are used to send and receive specific essential information whenever a data model is saved, changed, or even removed. This relates to specific past or present client-provided events that occur in real time. This article will teach you all you need to know about Django signals and how to use them in your project. Now, let’s connect the receiver with the dispatcher.core.core. (BACK TO TOP)
Today, we’re announcing the release of Earthly v0.7. The new version introduces changes that make Earthly work with Earthly CI, our new CI/CD platform (read more about it in Earthly CI: Launching a new era for CI ), in addition to promoting several features from Experimental or Beta to GA – notably Podman support and the WAIT command. We do not take major or minor releases lightly at Earthly.6 ). That’s why we are comfortable enabling all features promoted to GA by default. Earthly 0.go ./.../.. (BACK TO TOP)
Go is increasing in popularity for many reasons, from speed to ease of use and so much more. The Go standard library has most of the functionalities you’ll need to build web applications in the net/http package. There are many web-based packages in the Go ecosystem to build fast web applications. The Gin framework is one of the popular web packages in the Go ecosystem for building web applications. This tutorial will walk you through developing web applications in Go with the Gin framework. (BACK TO TOP)
New fellows include PhD candidates in operations research and computer science. (BACK TO TOP)
How the former astrobiology professor is charting new territory as a scientist for Amazon Flex. (BACK TO TOP)
Session focused on tips and tools that can help customers reduce the carbon footprint of artificial intelligence and machine learning workloads. (BACK TO TOP)
Today on Day Two Cloud we put on our thinking caps about platforms, cloud, and multicloud. The last ten years or so has been a push for "cloud-first," but any wholesale approach to "X-first" (cloud, edge, digital, etc.) is problematic. We discuss why. We also explore strategies for CTOs, IT managers, and engineers on how to grapple with cloud strategy, implementation, and operation. The post Day Two Cloud 184: Think Multiplatform, Not Multicloud appeared first on Packet Pushers . (BACK TO TOP)
Today on the Tech Bytes podcast we’re talking about OpenTelemetry with sponsor Cisco ThousandEyes. OpenTelemetry is an open collection of tools, APIs, and SDKs to help share telemetry data among different monitoring and analysis platforms to improve data correlation and visibility. ThousandEyes, the first network visibility platform to support OpenTelemetry, joins the podcast to discuss how it works, use cases, and more. (BACK TO TOP)
Is the private 5G market big enough to justify HPE's acquisition of Athonet? Is saving money worth retreating from public cloud? Why are organizations still getting bit by basic cloud misconfigurations? Will an appetite for AI deliver results for Nvidia? We explore these and other questions in the latest Network Break podcast. The post Network Break 419: HPE Buys Athonet For Private 5G; Exit Public Cloud, Save Millions? appeared first on Packet Pushers . (BACK TO TOP)
In today’s Heavy Networking show with sponsor Broadcom we go deep into network management and Digital Experience Monitoring (DEM). At its heart, DEM is about understanding the user experience of the network. Network monitoring and management products that incorporate user experience, such as Broadcom's DX NetOps, can provide visibility into network and application performance to help inform troubleshooting efforts and speed resolution. (BACK TO TOP)
In this blog post, we are proud to introduce Oxy - our modern proxy framework, developed using the Rust programming language (BACK TO TOP)
In this blog post, I’m excited to show off some of the new tools in Cloudflare’s developer arsenal, D1 and Queues, to prototype and ship an internal tool for our SEO experts at Cloudflare. (BACK TO TOP)
Introducing a new DNS platform that powers 1.1.1.1 and various other products. (BACK TO TOP)
Engineers at Cloudflare have written a replacement in Rust for one of the oldest and least-well understood parts of the Cloudflare infrastructure, cf-html, which is an NGINX module. In doing so we learned a lot about how NGINX works, and paved the way to move away from NGINX entirely. (BACK TO TOP)
If you grew up in a snowy climate, chances are you’ve ridden a sled or toboggan when you were young. The downhill part of sledding is great fun, but dragging …read more (BACK TO TOP)
It might not seem too impressive these days, but when microcontrollers with hardware USB support were more expensive and rare, the VUSB library was often used to create USB devices …read more (BACK TO TOP)
After three years, it’s odd to think back to those few weeks before the COVID-19 pandemic morphed from something on the news into an immediate and ever-present threat which kept …read more (BACK TO TOP)
While bicycle gearboxes date back to at least the 1920s, they’re relatively unseen in bike racing. One exception is Honda’s race-winning mid-drive gearboxes, and [Alee Denham] gives us a look …read more (BACK TO TOP)
Pluralistic: VW wouldn't locate kidnapped child because his mother didn't pay for find-my-car subscription (28 Feb 2023)
Today's links VW wouldn't help find kidnapped child because his mother wasn't paying for find-my-car subscription: All the harms of surveillance, none of the benefits. Hey look at this: Delights to delectate. A violent car-theft has the potential to hurt or kill people, after all. And yet, here we are. Like most (all?) major car makers, Volkswagen has filled its vehicles with surveillance gear, and has a hot side-hustle as a funnel for the data-brokerage industry. She called 911. https://en.yoz. (BACK TO TOP)
Today's links Podcasting "Twiddler": What makes digital platforms so enshittification prone? Hey look at this: Delights to delectate.medium.com/twiddler-1b5c9690cce6 Enshittification, you'll recall, is the lifecycle of the online platform: first, the platform allocates surpluses to end-users; then, once users are locked in, those surpluses are taken away and given to business-customers. https://pluralistic.net/2023/01/21/potemkin-ai/#hey-guys Facebook is the poster-child for enshittification.f. (BACK TO TOP)
Pluralistic: Dow promised to turn sneakers into playground surfaces, then dumped them in Indonesia (26 Feb 2023)
Today's links Dow promised to turn sneakers into playground surfaces, then dumped them in Indonesia: Corporate "recycling" programs are just obfuscated landfills. Hey look at this: Delights to delectate. But the shoes it collected in its "recycling" bins were illegally dumped in Indonesia. This isn't an aberration: it's how nearly all plastic recycling has always worked. https://pluralistic.chicagotribune. 90% of the plastics created has never been – and will never be – recycled.reuters.reuters. (BACK TO TOP)
Today's links This is your brain on fraud apologetics: The curious comfort of victim-blaming. Hey look at this: Delights to delectate." https://research.google/pubs/pub334/ The co-authors were Lawrence Page and Sergey Brin, and the "large-scale hypertextual web search-engine" they were describing was their new project, which they called "Google." They were 100% correct – prescient, even! On Wednesday night, a friend came over to watch some TV with us. We ordered out. We got scammed.com.com).g. (BACK TO TOP)
You shouldn’t need a Ph.D. in your APM tool to understand the performance of your application. Sentry’s new approach to application monitoring is focused on being actionable, affordable, and is actually built for developers. Learn how we're redefining the future of APM. (BACK TO TOP)
How your code performs isn’t a subjective debate. Well, at least not anymore — in the past few months, Sentry has started telling you… (BACK TO TOP)
Implementing the right processes and tooling is key to bring your application’s performance from ‘adequate’ to ‘delightful’. Find out how to treat performance as a feature. (BACK TO TOP)
A Sentaur who uses Sentry to build Sentry wanted to know where a specific service associated with an issue was being hosted in our cloud… (BACK TO TOP)
https://www.timescale.com/blog/
One way to optimize your data processing is by improving data locality when downsampling your data. Watch this talk at RubyConfTH, where we benchmark downsampling data in Ruby or in a SQL version powered by Timescale’s hyperfunctions. (BACK TO TOP)
Understanding PostgreSQL views and materialized views is essential to fully grasp one of the most popular features in Timescale that will save you time and disk space: continuous aggregates. (BACK TO TOP)
How Ndustrial Is Providing Fast Real-Time Queries and Safely Storing Client Data With 97 % Compression
Read how Ndustrial is helping its clients save energy and money by collecting and connecting production and energy data to quickly answer real-time queries—all while using TimescaleDB to store and compress data up to 97 percent. (BACK TO TOP)
Watch this step-by-step guide on creating a serverless time-series application consisting of two Lambda functions written in Python, using Timescale Cloud and AWS Lambda. (BACK TO TOP)
Posted by Florian Hartmann, Software Engineer, and Peter Kairouz, Research Scientist, Google Research Federated learning is a distributed way of training machine learning (ML) models where data is locally processed and only focused model updates and metrics that are intended for immediate aggregation are shared with a server that orchestrates training. This allows the training of models on locally available signals without exposing raw data to servers, increasing user privacy. (BACK TO TOP)
Posted by Minji Yoon, Research Intern, and Bryan Perozzi, Research Scientist, Google Research, Graph Mining Team Industrial applications of machine learning are commonly composed of various items that have differing data modalities or feature distributions. Heterogeneous graphs (HGs) offer a unified view of these multimodal data systems by defining multiple types of nodes (for each data type) and edges (for the relation between data items). E-commerce heterogeneous graph. Node labels (e.g.g.g.g. (BACK TO TOP)
Posted by Natasha Noy, Research Scientist, and Omar Benjelloun, Software Engineer, Google Research Access to datasets is critical to many of today's endeavors across verticals and industries, whether scientific research, business analysis, or public policy. In the scientific community and throughout various levels of the public sector, reproducibility and transparency are essential for progress, so sharing data is vital.org structured data. The schema. For dataset pages, schema.com , zenodo.). (BACK TO TOP)
Posted by Posted by Leslie Yeh, Director, University Relations (This is Part 9 in our series of posts covering different topical areas of research at Google. You can find other posts in the series here .) Sharing knowledge is essential to Google’s research philosophy — it accelerates technological progress and expands capabilities community-wide. Solving complex problems requires bringing together diverse minds and resources collaboratively.8% certainty when used correctly. (BACK TO TOP)
Posted by Yang Li, Research Scientist, and Gang Li, Software Engineer, Google Research The computational understanding of user interfaces (UI) is a key step towards achieving intelligent UI behaviors. Previously, we investigated various UI modeling tasks, including widget captioning , screen summarization , and command grounding , that address diverse interaction scenarios such as automation and accessibility. Although the work made some progress, a few challenges remain.e.g.e.g.3 65.e. (BACK TO TOP)
I'm a programming child of the agile software movement. Just as I was starting out, Kent Beck published Extreme Programming Explained in 2000. It was a revelation. I had just enough exposure to Big Upfront Design and waterfall methodologies to appreciate what a monumental shift this was. Beck's methodology x-rayed the ills of the traditional approach, and made the terminal diagnosis crystal clear. There was plenty of vision, plenty of principles, but they all lead to running code.....". (BACK TO TOP)
It's finally time to talk about the technology we've been building at 37signals to leave the cloud with HEY and many of our legacy applications. We already run Basecamp on our own hardware, but we deploy it using an old tool known as Capistrano. This is the deployment tool we originally wrote at 37signals all the way back in 2005, when we first had to deploy applications to multiple servers. It's been a trusty companion for many years, but it's time is up, and the game has moved on.0. (BACK TO TOP)
Remember back in November, when seemingly every pious public persona and their coteries announced final farewells on Twitter? All in the clear expectation that the service would sink any moment? Like they had seen the iceberg, and was sure – just sure! – that impact was imminent. Except, there was no iceberg, no impact, no sinking ship. The prophecy failed and the farewells were in vain. That's not to say that Twitter was or is free of challenges. But they're mostly economic in nature. (BACK TO TOP)
Cloud aficionados love pinning the true promise of the cloud on serverless functions and services. Not getting the savings you thought you would with the cloud? It's because you didn't go serverless. Frustrated with the complexity of the cloud? Serverless! Performance questions? SERVERLESS! Serverless has become a mantra to chant because it's still appears just magic enough that most people won't question the fundamentals. But you should. Let's start at the beginning. (BACK TO TOP)
It can take a long time and be tricky business to get a gaggle of humans rolling in the same, right direction. When it finally happens, you feel it. The pace is effortless. The interactions are easy. This is the moment when momentum asks you to get out of the way. The easiest way to mess up a good thing is to mess with it at all. However much better off their companies would be if it did. And I think the reason Jason and I have been able to do this is because management is not our first love. (BACK TO TOP)
This is our 9th Kaizen with Adam & Jerod. We start today’s conversation with the most important thing: embracing change. For Gerhard, this means putting Ship It on hold after this episode. It also means making more time to experiment, maybe try a few of those small bets that we recently talked about with Daniel. Kaizen will continue, we are thinking on the Changelog. Stick around to hear the rest. (BACK TO TOP)
This week we’re joined by Brigit Murtaugh, Product Manager on the Visual Studio Code team at Microsoft, and we’re talking about Development Containers and the Dev Container spec. Ever since we talked with Cory Wilkerson about Coding in the cloud with Codespaces we’ve wanted to get the Changelog.com codebase setup with a dev environment in the cloud to more easily support contributions. (BACK TO TOP)
With the recent proliferation of generative AI models (from OpenAI, co:here, Anthropic, etc.), practitioners are racing to come up with best practices around prompting, grounding, and control of outputs. Chris and Daniel take a deep dive into the kinds of behavior we are seeing with this latest wave of models (both good and bad) and what leads to that behavior. They also dig into some prompting and integration tips. (BACK TO TOP)
Stack Overflow's architecture, Lobsters' killer libraries, Linux is ready for modern Macs, what to expect from your framework & GoatCounter web analytics (Changelog News)
Sahn Lam details Stack Overflow’s monolith/on-prem architecture, Hillel Wayne asks the Lobsters community for killer libraries, Linux 6.2 is ready to run on M1 Macs thanks to Asahi Linux, Johan Halse writes up what to expect from your web framework & Eli Bendersky on using GoatCounter for blog analytics. (BACK TO TOP)
This week Evan Prodromou is back to take us deeper into the Fediverse. As many of us reconsider our relationship with Twitter, Mastodon has been by-and-large the target of migration. They helped to popularize the idea of a federated universe of community-owned, decentralized, social networks. And, at the heart of it all is ActivityPub. ActivityPub is a decentralized social networking protocol published by the W3C. (BACK TO TOP)
Una & Adam from The CSS Podcast defend their Frontend Feud title against challengers David & Shaw from the keyframers. Let’s get it on! (BACK TO TOP)
https://www.microsoft.com/en-us/security/blog/
Gartner has again recognized Microsoft as a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, positioned highest on the Ability to Execute. The post Microsoft is named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms appeared first on Microsoft Security Blog . (BACK TO TOP)
At Microsoft, we’ve been working on the challenges and opportunities of AI for years. Today we’re sharing some recent developments so that the community can be better informed and better equipped for a new world of AI exploration. The post New research, tooling, and partnerships for more secure AI and machine learning appeared first on Microsoft Security Blog . (BACK TO TOP)
The proposed Securities and Exchange Commission rule creates new reporting obligations for United States publicly traded companies to disclose cybersecurity incidents, risk management, policies, and governance. This blog describes how the rule is an opportunity for the IT security team to provide value to the company. The post SEC cyber risk management rule—a security and compliance opportunity appeared first on Microsoft Security Blog . (BACK TO TOP)
Today marks a significant shift in endpoint management and security. We are launching the Microsoft Intune Suite, which unifies mission-critical advanced endpoint management and security solutions into one simple bundle. The post The Microsoft Intune Suite fuels cyber safety and IT efficiency appeared first on Microsoft Security Blog . (BACK TO TOP)
Get an in-depth recap of the latest Microsoft Security Experts Roundtable, featuring discussions on trends in global cybercrime, cyber-influence operations, cybersecurity for manufacturing and Internet of Things, and more. The post Microsoft Security Experts discuss evolving threats in roundtable chat appeared first on Microsoft Security Blog . (BACK TO TOP)
Learn how Zero Trust security can help minimize damage from a breach, support hybrid work, protect sensitive data, and more. The post 5 reasons to adopt a Zero Trust security strategy for your business appeared first on Microsoft Security Blog . (BACK TO TOP)
https://towardsdatascience.com
Coffee Data Science To better measure the difference between the top and bottom of each hole Cameras have greatly advanced over the years allowing people to take high quality images. While this can be useful for computer vision applications, often simple changes in design of experiment can greatly improve the quality of these images for specific applications. Enter coffee! For a few years, I have been applying my image processing skills to image espresso filter baskets . (BACK TO TOP)
Implementing the Quantum Approximate Optimization Algorithm using functional programming Continue reading on Towards Data Science » (BACK TO TOP)
Photo by Isaac Smith on Unsplash Once your model is deployed, monitoring its performance plays a crucial role in ensuring the quality of your ML system. To calculate metrics such as accuracy, precision, recall, or f1-score, labels are required. However, in many cases, labels can be unavailable, partially available or come in a delayed fashion. In those cases, the ability to estimate the model’s performance can be helpful. a.g. if the score is 0. b. This is known as covariate shift . (BACK TO TOP)
An Introduction to the PyGWalker Library for Easy Data Visualisation Continue reading on Towards Data Science » (BACK TO TOP)
Master Data and Analytics reports and processes with five templates Continue reading on Towards Data Science » (BACK TO TOP)
With so much of our collective attention still focused on chatbots, it’s easy to forget just how vast and diverse the field of natural language processing (NLP) actually is. From translation to text classification and beyond, data scientists and machine learning engineers have worked (and are still working) on exciting projects whose names don’t start with a C and end with a T. Digging into the key ingredients of an NLP project . The art of finding the right data for specific NLP tasks . (BACK TO TOP)
Learn the rules of using assertions in Python — and those of not using them. Continue reading on Towards Data Science » (BACK TO TOP)
We found success in a blended approach to product development—a marriage of the skills and expertise of data, AI, analytics, and software engineering teams—to build a platform powered by componentized AI. The post How Intuit democratizes AI development across teams through reusability appeared first on Stack Overflow Blog . (BACK TO TOP)
Although a lot has changed since Stack Overflow launched in 2008, one thing has not: Stack Overflow continues to help people find the answers they need, when they need them. Our platform supports millions of the world's most active developers and technologists who visit every month to ask questions, learn, and share technical knowledge. The post New pricing for Stack Overflow for Teams appeared first on Stack Overflow Blog . (BACK TO TOP)
Juan Linietsky, cofounder and lead developer of the Godot Engine, joins the home team for a conversation about what led him to create an open-source game engine, how open source is shaping game development, and the well-worn path from playing video games to learning to build them. The post The open-source game engine you’ve been waiting for: Godot (Ep. 542) appeared first on Stack Overflow Blog . (BACK TO TOP)
Everyone who says "tech debt" assumes they know what we’re all talking about, but their individual pictures differ quite a bit. The post Stop saying “technical debt” appeared first on Stack Overflow Blog . (BACK TO TOP)
We face larger than life challenges in our world. Maybe open source's wisdom of the crowds can help solve them. The post Why governments need open source more than ever appeared first on Stack Overflow Blog . (BACK TO TOP)
Serverless databases, expensive hash functions, and floating point numbers The post The Overflow #166: Writing code for other people appeared first on Stack Overflow Blog . (BACK TO TOP)
The home team talks with Jaclyn Rice Nelson, cofounder and CEO of Tribe AI, about the explosion of hype surrounding generative AI, what it’s like to work at a startup after working at Google, and how Tribe is leveraging the power of a specialist network. The post ML and AI consulting-as-a-service (Ep. 541) appeared first on Stack Overflow Blog . (BACK TO TOP)
Bulletin by Jakub Mikians