Skip to content

Latest commit

 

History

History
1608 lines (768 loc) · 95.5 KB

bulletin-2022-05-20.md

File metadata and controls

1608 lines (768 loc) · 95.5 KB

Bulletin for Friday, 20 May 2022

7 days digest


Computer Things (1)


dropbox.tech (1)


ongoing by Tim Bray (1)


Irrational Exuberance (1)


jacobian.org (1)


Notes on software development (1)


Posts on (1)


Daniel Lemire's blog (1)


Retool Blog (1)


Monzo - Technology (2)


Blog on Tailscale (2)


The Ably Blog (2)


Towards Data Science - Medium (2)


Weaveworks (2)


Google AI Blog (2)


Krebs on Security (2)


Sentry Blog RSS (3)


LinkedIn Engineering (4)


Pluralistic: Daily links from Cory Doctorow (4)


Timescale Blog (4)


Future (4)


Tech at Meta (4)


Amazon Science Homepage (4)


The CircleCI Blog Feed - CircleCI (4)


Microsoft Security Blog (5)


Blog – Hackaday (5)


Changelog Master Feed (5)


Earthly Blog (5)


Stack Overflow Blog (6)


The Full Feed - All of the Packet Pushers Podcasts (7)


The Cloudflare Blog (14)


Cloud Blog (20)


https://buttondown.email/hillelwayne

Conventionally we communicate programming ideas with talks, papers, and blog posts. But we can also communicate ideas with entire codebases. If someone finds a security exploit, she’ll sometimes publish a proof of concept to prove the exploit isn’t just theoretical. Now let’s say the exploit PoC comes with a ton of command-line flags: verbose mode, configuration options, output formats, the whole works. This makes codebases like any other kind of communication medium. Platform a technique. (BACK TO TOP)

https://dropbox.tech/feed

A good password manager should be able to securely store, sync, and even autofill your username and password when logging into websites and apps. A password manager like… Dropbox Passwords ! When we released Dropbox Passwords in the Summer of 2020, it was important we ensured that a user’s logins would always be available—and up to date—on any device they used. Eventually we found a solution that built on prior Dropbox syncing work. Initially, our sync algorithm used a two-way merge. (BACK TO TOP)

https://www.tbray.org/ongoing/ongoing.atom

(BACK TO TOP)

https://lethain.com/

I recently got an email about moving into an engineering management role too early in the email writer’s career: I became an engineering manager two years ago, which was also two years into my career. The reason is mainly that we were a small team and when the time came to add line management I was around and down for it. I was quite successful at this job and well recognized in the company. If you’re successful as a manager, it can be difficult to move back without slowing down your career. (BACK TO TOP)

https://jacobian.org/

Dishonesty at work is wrong except when it isn’t. (BACK TO TOP)

http://notes.eatonphil.com/

What is CockroachDB under the hood? Take a look at its go.mod and notice a number of dependencies that do a lot of work: a PostgreSQL wire protocol implementation , a storage layer , a Raft implementation for distributed consensus . And not part of go.mod but still building on 3rd party code, PostgreSQL's grammar definition . To be absurdly reductionist, CockroachDB is just the glue around these libraries. All nodes will contain the same data.0.0.1 -p 6000 psql (13.4, server 0.0.0.0.4, server 0. (BACK TO TOP)

https://paulbutler.org/posts/

Disclosure: I hold short positions in companies mentioned in this article. This is not financial advice. Six months ago, I wrote: [Bitcoin] miners burn an enormous amount of capital just to capture the same slice of a diminishing pie, but they take advantage of investor confusion over how mining works to frame it as investing in growth. I want to go deeper on that idea. But first, some accounting. (BACK TO TOP)

https://lemire.me/blog

There are various ways in software to handle error conditions. In C or Go, one returns error code. Other programming languages like C++ or Java prefer to throw exceptions. One benefit of using exceptions is that it keeps your code mostly clean since the error-handling code is often separate. It is debatable whether handling exceptions … Continue reading Avoid exception throwing in performance-sensitive code (BACK TO TOP)

https://retool.com/blog/

This guide aims to share everything you need to know about Vue components, and includes in-depth examples of class components, dynamic components, single file components, functional components, and table components. (BACK TO TOP)

https://monzo.com/blog/technology

Izak joined Monzo as a data scientist in February. In this post, he shares his journey to Monzo and his early experience in the data discipline, with our data stack, and in the team looking after our Customer Operations. (BACK TO TOP)

Our success relies on us rapidly shipping new features. To achieve this rapid release cadence, we’ve optimised our engineering culture, tooling, and architecture to go from idea to production as frictionless as possible, without sacrificing safety. (BACK TO TOP)

https://tailscale.com/blog/

When Tailscale started working toward SOC 2, we started to ask some fundamental questions about growing and continually improving our security posture. This led us to partner with Latacora , a security firm that specializes in building information security practices for startups. The interview below has been edited for clarity. I think the story of how Tailscale and Latacora work together is something our blog readers will find interesting. There are some places where I feel very comfortable.” (BACK TO TOP)

At Tailscale, we are ridiculously passionate about security and privacy—so much so that we built a product that, by design, can’t see your data. We don’t even want to see your data. Behind the scenes, we’ve been completing security audits, working with expert cryptographers to validate our key management , and ensuring we lock down access to our production environment. We’re excited to announce that we’ve received our SOC 2 Type I report, reaffirming our commitment to security . (BACK TO TOP)

https://ably.com/

Ably publishes a first-of-its-kind report into the state of edge messaging infrastructure. (BACK TO TOP)

As an edge messaging broker, Ably facilitates the distribution of low-latency data by operating in proximity to users and their devices. (BACK TO TOP)

https://towardsdatascience.com

Forecasting cases, hospitalization and deaths with CDC’s wastewater data. Uses pandas windowing and correlation. Photo by Marcin Jozwiak on  Unsplash Summary More than 50,000 wastewater tests across the United States were matched with COVID-19 outcomes (cases, hospitalization, death) from the same location and timeframe. The resulting dataset was analyzed for correlation between SARS-CoV-2 RNA level and the outcomes, showing a positive relationship with all three measures. CovidDF = CovidDF.491. (BACK TO TOP)

A guide to outlier detection methods with examples in Python Continue reading on Towards Data Science » (BACK TO TOP)

https://www.weave.works/

GitOps is an operational software development framework that enables organizations to manage IT infrastructure using Git and deliver software applications efficiently. It is an evolution of DevOps that combines Infrastructure-as-Code (IaC) and DevOps best practices for designing a model that can instantly reproduce the system’s cloud infrastructure and manage architecture based on the state of Git repositories. It can be daunting. This will help both teams work together seamlessly. (BACK TO TOP)

This blog post is authored by David Stauffer, Product Manager and Richard Case, Tech lead. Liquid Metal is a GitOps enabled, distributed Cluster-as-a-Service (CaaS) platform that simplifies scaling Kubernetes clusters across multiple environments. Originally built to help Telcos deliver 5G services at the edge, any organization can now provision Kubernetes clusters dynamically across both lightweight VMs and bare metal. Consider it the best of both worlds. This was Deutsche Telekom’s use case.e. (BACK TO TOP)

http://ai.googleblog.com/

Posted by Jiahui Yu, Senior Research Scientist, and Jing Yu Koh, Research Software Engineer, Google Research In recent years, natural language processing models have dramatically improved their ability to learn general-purpose representations, which has resulted in significant performance gains for a wide range of natural language generation and natural language understanding tasks.e., predicting sequences one token at a time).g., a dog or a cat).6% over the VQGAN model (FID 7.35).6 to 227.0 1. (BACK TO TOP)

Posted by Aurelien Boffy, Senior Staff Software Engineer, and Roberto Pieraccini, Engineering Director, Google Assistant When people converse with one another, context and references play a critical role in driving their conversation more efficiently. For instance, if one asks the question “Who wrote Romeo and Juliet?” and, after receiving an answer, asks “Where was he born?”, it is clear that ‘he’ is referring to William Shakespeare without the need to explicitly mention him.g.e.e. (BACK TO TOP)

https://krebsonsecurity.com

Some of more tech-savvy Democrats in the U.S. Senate are asking the Federal Trade Commission (FTC) to investigate identity-proofing company ID.me for "deceptive statements" the company and its founder allegedly made over how they handle facial recognition data collected on behalf of the Internal Revenue Service, which until recently required anyone seeking a new IRS account online to provide a live video selfie to ID.me. (BACK TO TOP)

Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder's appropriate security level. But many government employees aren't issued an approved card reader device that lets them use these cards at home or remotely, and so turn to low-cost readers they find online. What could go wrong? Here's one example. (BACK TO TOP)

https://blog.sentry.io

In this tutorial, we’ll show how to add Sentry to a Django application so you can track and resolve any errors or performance issues occurring while your application is in production. (BACK TO TOP)

"Besides single event investigations, Sentry is very useful to get a general overview of how our app is performing from dev to QA to production and we use dashboards to make sure that we’re always up to date on how performance is looking across the frontend, the backend, and our evaluation service." (BACK TO TOP)

This article discusses the basics of exception handling in Java and how Sentry can help make exception handling simple and more powerful. (BACK TO TOP)

https://engineering.linkedin.com/blog.rss.html

Co-authors: Eing Ong, Shannon Bain, and Daniel Qiu What is MLOps? Before we dive into our MLOps portal, let’s begin by defining MLOps (Machine Learning Operations). MLOps is about continuously running ML correctly by managing the full lifecycle (developing, improving, and maintaining) for AI models. At LinkedIn, we recognized this need back in 2017. We […] (BACK TO TOP)

Venice, which was developed in late 2015, is a key-value store platform built for serving read-heavy workloads and optimized for serving derived data. Since being deployed to production in 2016, it has become very popular in the recommendation world to serve derived datasets inside LinkedIn. Venice handles single-get and small batch-get requests very efficiently and has conveniently scaled to accommodate the organic traffic growth. These requests […] (BACK TO TOP)

Co-authors: Ameen Maali and Surbhi Jain At LinkedIn, our security team strives to provide a safe and secure experience for our 830M members and customers by quickly addressing security vulnerabilities, constantly improving our defenses, and safeguarding our product development process. […] (BACK TO TOP)

Co-authors: Joshua Shinavier and Shirshanka Das Data governance is easy… as long as the data to be governed is small and simple. A handful of developers creating a startup company can get away with relatively lightweight solutions for managing their data, but things change as scale and complexity increases. Like a hermit crab outgrowing its shell, we constantly have to re-evaluate the tools and platforms we use for data management, as what worked well yesterday may or may not be adequate today. (BACK TO TOP)

https://pluralistic.net

Today's links Your mom is a tech ninja: Your boss? Not so much. The impossible scam of US drug plans: Even the guy who invented them can't figure them out. Hey look at this: Delights to delectate. I have a lot of that. But there's another component, one that's often invisible to people like me: the extent to which your technology was designed to suit your needs. I have a lot of that, too. I am good at tech, but tech is also good at me. https://simplysecure.cs.dartmouth. Moms, not so much.wired. (BACK TO TOP)

Today's links A(nother) way in which Facebook is the 21st Century's tobacco industry: Millions for front groups who insist that only Mark Zuckerberg can save us from Xi Jinping.djournal.com/opinion/columnists/clayton-stanley-north-mississippi-should-be-in-tech-revolution/article_7fa044d6-f7d1-57d1-8441-f53f0aef569d.html Those are extremely normal ads, because if there's one thing that extremely normal people love, it is Facebook.S. https://www.washingtonpost." If this sounds familiar, it should. (BACK TO TOP)

Today's links How Big Pharma bribed docs to overprescribe opioids: Analysis from UCSF's "Opioid Industry Documents" repository. Hey look at this: Delights to delectate. This day in history: 2002, 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading How Big Pharma bribed docs to overprescribe opioids (permalink) I have complex chronic pain, and I've seen a lot of specialists. One of them prescribed long-term opioids for me.P. (BACK TO TOP)

Today's links Amy's Kitchen, a case-study in the problems with consumerism: You are not an ambulatory wallet. Hey look at this: Delights to delectate. This day in history: 2002, 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Amy's Kitchen, a case-study in the problems with consumerism (permalink) As theories of change go, consumerism has a lot going for it. But voting with your dollars has some obvious deficits.g.bbc. (BACK TO TOP)

https://www.timescale.com/blog/

The latest Promscale release comes with a set of alert rules, runbooks, and a dashboard that encapsulates the team’s best practices to monitor and troubleshoot Promscale. (BACK TO TOP)

You can now configure Recording Rules directly in Promscale using PromQL and the same configuration file you would use in Prometheus! (BACK TO TOP)

Promscale now supports Prometheus alerting! You can directly configure Promscale alerts using PromQL queries to get notified when any of your metrics goes off, helping you identify anomalies early. (BACK TO TOP)

Learn how observability powered by SQL can help you unveil performance issues in your distributed systems, courtesy of the now generally available OpenTelemetry tracing support in Promscale. (BACK TO TOP)

https://future.a16z.com

It was the second game of a double-header, and the Washington Nationals had a problem. Not on the field, of course: The soon-to-be World Series champions were performing beautifully. But as they waited out a rain delay, something went awry behind the scenes. A task scheduler deep within the team’s analytics infrastructure stopped running. The... Read More The post Negative Engineering and the Art of Failing Successfully appeared first on Future . (BACK TO TOP)

For new consumer startups targeting young people, one of the most popular marketing strategies is an on-campus student ambassador program. Household names like Tinder, Bumble, and Red Bull leveraged these programs successfully in the early days (and still today) to grow their brands across the country, and today’s generation of startups continue to build on... Read More The post A Startup’s Guide to Launching College Ambassador Programs appeared first on Future . (BACK TO TOP)

Hopper, which finds travelers low rates on flights, hotels, and rental cars, is most frequently described as a travel-booking app. It also qualifies as an online travel agency (or OTA), a term that applies to any company selling travel on the internet. OTA is a useful classification because numerous brands in the travel space, including... Read More The post Hopper CEO on Super-App Ambitions and Becoming an Everything Startup appeared first on Future . (BACK TO TOP)

The market has taken a downturn, and every other blog or tweetstorm seems to offer the same general advice: conserve cash, extend runway, shift from focusing on growth to focusing on efficiency. We’ve advised many of our later stage growth companies through market ups and downs, and we’ve realized that, when the market dips, founders... Read More The post A Framework for Navigating Down Markets appeared first on Future . (BACK TO TOP)

https://tech.fb.com

This is an excerpt of a post by Meta's President of Global Affairs, Nick Clegg. Find the full post here. When Facebook rebranded as Meta last October, it brought into the mainstream a concept that has been exciting the bright minds of Silicon Valley for years: the metaverse. Mark Zuckerberg’s unveiling of a vision for […] The post Making the metaverse: What it is, how it will be built, and why it matters appeared first on Tech at Meta . (BACK TO TOP)

At Reality Labs, one of our core Responsible Innovation Principles is to consider everyone as we develop new products—after all, inclusive design is good design, and our products benefit from design practices that take everyone into account. Whether it’s hardware or software, we need to be inclusive of our diverse community. This is especially true […] The post Consider everyone: Building with accessibility in mind appeared first on Tech at Meta . (BACK TO TOP)

The doors are now open at the Meta Store, our first-ever brick-and-mortar shop, in Burlingame, California. The store stocks the latest Meta products, including Quest 2, Ray-Ban Stories, and various Portal models, but the real magic is when guests are able to experience them in person for the first time. These experiences are available to anyone […] The post On the big screen: An immersive mixed-reality centerpiece for Meta’s first store appeared first on Tech at Meta . (BACK TO TOP)

Aparna Ramani Job Title: VP Engineering, Data Infrastructure Years at Meta: 6 Education: Arizona State University Hometown: Los Altos, California Tell us about your role at Meta. Aparna Ramani: I run our Data Infrastructure organization. We’re a team of 700 engineers responsible for storing, protecting, and understanding all the data that’s produced by systems across […] The post Leadership at Meta: Aparna Ramani appeared first on Tech at Meta . (BACK TO TOP)

https://www.amazon.science/

Amazon Athena reduces query execution time by 14% by eliminating redundant operations. (BACK TO TOP)

Two authors of Amazon Redshift research paper that will be presented at leading international forum for database researchers reflect on how far the first petabyte scale cloud data warehouse has advanced since it was announced ten years ago. (BACK TO TOP)

Papers focus on speech conversion and data augmentation — and sometimes both at once. (BACK TO TOP)

Matt Taddy, vice president of Amazon’s Private Brands business, is the coauthor of Modern Business Analytics: Practical Data Science for Decision Making, a primer for those who want to gain the skills to use data science to help make decisions in business and beyond. (BACK TO TOP)

https://circleci.com/blog/

Most organizations that make software — from small startups to multi-billion-dollar behemoths — use third-party libraries and tools to develop their applications. Modern apps depend on many external components to build and deliver software to customers. These libraries and tools are collectively called the software supply chain . That exposes any accessed or processed data to risk. Threat actors exploit these supply chain vulnerabilities to infiltrate target networks.S. (BACK TO TOP)

This tutorial covers: Why use Axios? Making Axios POST and GET requests Testing the requests Axios is a promise-based HTTP library that lets developers make requests to either their own or a third-party server to fetch data. It offers different ways of making requests such as GET , POST , PUT/PATCH , and DELETE . Prerequisites To follow along with the tutorial, make sure that you have: NodeJS installed in your system. A GitHub account. A CircleCI account.typicode. In the users.typicode.typicode. (BACK TO TOP)

This tutorial covers: The Flask logging module Logging Flask events by severity level Testing the logging module Without logs, or a good understanding of them, debugging an application or looking through an error stack trace can be challenging. Luckily, Flask logging can change the way you understand debugging and how you interact with logs produced by the application. The Flask logging module gives you a way to record errors over different severity levels.5 installed in your machine.python.0.0. (BACK TO TOP)

In a single, monolithic repository, also known as a monorepo, you keep all your application and microservice code in the same source code repository (usually Git). Typically, teams split the code of various app components into subfolders and use Git workflow for new features or bug fixes. This approach is natural for most applications or systems developed using a monolithic architecture. This monorepo code typically has a single build pipeline that produces the application executable. (BACK TO TOP)

https://www.microsoft.com/security/blog

Observing a 254% increase in activity over the last six months from a versatile Linux trojan called XorDdos, the Microsoft 365 Defender research team provides in-depth analysis into this stealthy malware's capabilities and key infection signs. The post Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices appeared first on Microsoft Security Blog . (BACK TO TOP)

Learn how insider threats, data siloes, and shifting responsibilities are all affecting data management—and how security professionals can diminish risks to the organization. The post So you want to be a CISO: What you should know about data protection appeared first on Microsoft Security Blog . (BACK TO TOP)

The acceleration of cloud journeys fueled by the pandemic, and ever-increasing concerns about data security and information privacy, have made access management one of the hottest topics. The post Easy authentication and authorization in Azure Active Directory with No-Code Datawiza appeared first on Microsoft Security Blog . (BACK TO TOP)

The rise in cryptocurrency market capitalization paved the way to the emergence of threats Microsoft security researchers are referring to as “cryware”—information stealers focused on gathering and exfiltrating data from non-custodial cryptocurrency wallets. The post In hot pursuit of ‘cryware’: Defending hot wallets from attacks appeared first on Microsoft Security Blog . (BACK TO TOP)

RSA 2022 is happening in person—find out about Microsoft-sponsored sessions, pre-day events, speakers, awards, and more. The post Microsoft showcases the future of comprehensive security at RSA 2022 appeared first on Microsoft Security Blog . (BACK TO TOP)

https://hackaday.com

When it comes to putting a flexible grip on a tool, you might reach for a self-fusing silicone tape or other similar product. However, [Potent Printables] has discovered you can …read more (BACK TO TOP)

At first blush, it might seem like projects that make extensive use of computer vision or machine learning would need to be based on powerful computing platforms with plenty of …read more (BACK TO TOP)

The Logitech Z906 is a well-rounded 5.1 surround sound system. It’s capable of putting out 1000W in peak power, and can decode Dolby Digital and DTS soundtracks as you’d expect. …read more (BACK TO TOP)

Once you get tired of printing keychains and earbud holders with your 3D printer, you’ll want to design things a bit more sophisticated. How about things that rotate? [3DSage] has …read more (BACK TO TOP)

While it’s true that some plants thrive on neglect, many of them do just fine with a few ounces of water once a week, as long as the light level …read more (BACK TO TOP)

https://changelog.com/master

Matt Holt & Mohammed S. Al Sahaf sit down with Natalie & Jon to discuss every gopher’s favorite open source web server with automatic HTTPS! In addition to laying out what Caddy is and why it’s interesting, we dive deep into how you can (and why you might want to) extend Caddy as a result of its modular architecture. (BACK TO TOP)

Connor Sears, founder and CEO of Rewatch, joins Adam to share the journey of creating Rewatch. What began inside of GitHub to help them thrive and connect is now available to every product team on the planet. Rewatch lets teams save, manage, and search all their video content so they can collaborate async and with greater flexibility. (BACK TO TOP)

Don’t all AI methods need a bunch of data to work? How could AI help document and revitalize endangered languages with “human-in-the-loop” or “active learning” methods? Sarah Moeller from the University of Florida joins us to discuss those and other related questions. She also shares many of her personal experiences working with languages in low resource settings. (BACK TO TOP)

This week we’re joined by Mike Riley and we’re talking about his book Portable Python Projects (Running your home on a Raspberry Pi). We breakdown the details of the latest Raspberry Pi hardware, various automation ideas from the book, why Mike prefers Python for scripting on a Raspberry Pi, and of course why the Raspberry Pi makes sense for home labs concerned about data security. Use the code PYPROJECTS to get a 35% discount on the book. (BACK TO TOP)

KBall interviews TPW about the 1.0 release of Redwood - what it provides, why they’ve repositioned as a “JavaScript framework optimized for startups”, and what’s coming next. (BACK TO TOP)

https://earthly.dev/blog/

As projects increase in complexity, so do the benefits of using tools to automate parts of the deployment process. Scaling your infrastructure and deploying to multiple platforms and locations can become unmanageable without the right workflows in place. Fortunately, help is available in the form of the increasing selection of tools and platforms, like Kubernetes and Terraform , that are geared toward solving such problems. Terraform is an open source infrastructure management system. (BACK TO TOP)

Kubernetes persistent volumes provide data storage for stateful applications. They abstract a storage system’s implementation from how it’s consumed by your pods. A persistent volume could store data locally, on a network share, or in a block storage volume provided by a cloud vendor. Persistent volumes solve the challenges of storing persistent data, such as databases and logs, in Kubernetes. Containers running inside pods are stateless and have ephemeral filesystems.requests.storage field... (BACK TO TOP)

Bash (bourne again shell) scripts give you the ability to turn series of manual commands into an easily runnable and repeatable script . This can be especially useful when working with files. For programmers, Bash enables you to efficiently search for particular keywords or phrases by reading each line separately. When you’re done with this article, you’ll be able to use Bash to read files line by line, use custom delimiters, assign variables, and more.sh : $ chmod +x read_bash./cat_read.txt | . (BACK TO TOP)

Previously, I built some GRPC things , and some AWS Lambda things, but can both be combined together? That is can I set up a go service, that runs as lambda, and can respond to GRPC requests. The answer is no, and I’ll explain why in a second. However, I can do things close to GRPC on lambda and some of them might be useful. GRPC Proxy on Lambda One thing its easy to do is setup a web proxy that runs on lambda and gets requests via API GATEWAY and forwards them on...Start(handlerfunc.us-east-1. (BACK TO TOP)

Kubescape is a free tool that improves Kubernetes security by scanning clusters and detecting YAML files that are not compliant with security standards such as the National Security Agency (NSA) guidelines. It also scans for image vulnerabilities. After scanning and analyzing your cluster it will output your cluster’s risk analysis into a report in PDF or JSON format. In this tutorial, you will learn how to scan your Kubernetes cluster using Kubescape.githubusercontent... 1.0.armo.template.spec. (BACK TO TOP)

https://stackoverflow.blog

While the future may be a mystery, you can design software to accommodate future changes. But how much future-proofing gets in the way of good design? The post Crystal balls and clairvoyance: Future proofing in a world of inevitable change appeared first on Stack Overflow Blog . (BACK TO TOP)

Infrastructure as code complicated enough, but building a managed IAC service is a whole other level of complicated. The post Building out a managed Kubernetes service is a bigger job than you think (Ep.443) appeared first on Stack Overflow Blog . (BACK TO TOP)

Matt and Cassidy talk about the open-source startups winning investors and attention, why even small contributions to open-source projects are important, and how founders can encourage those contributions. The post Open-source is winning over developers and investors (Ep. 442) appeared first on Stack Overflow Blog . (BACK TO TOP)

When the bots came for us, we strengthened our defenses. Here's what we learned about parrying a few DDoS attacks. The post Stack under attack: what we learned about handling DDoS attacks appeared first on Stack Overflow Blog . (BACK TO TOP)

This week: The Key V2.0, how to encourage documentation in open-source communities, and why security needs to shift left. The post The Overflow #125: Unlock your full programming potential with The Key V2.0 appeared first on Stack Overflow Blog . (BACK TO TOP)

Ben and Cassidy chat with Ian Tien, CEO and cofounder, and Corey Hulen, CTO and cofounder of Mattermost, an open-source platform for developer collaboration. The post Software is adopted, not sold (Ep. 441) appeared first on Stack Overflow Blog . (BACK TO TOP)

https://packetpushers.net

In this episode of IPv6 Buzz, Ed, Scott, and Tom talk about innovation using IPv6. The limitless supply of addresses creates new opportunities for network engineers and application developers, including flat networks with many more nodes, robust segmentation options, supporting overlays, and more. The post IPv6 Buzz 101: Innovating With IPv6 appeared first on Packet Pushers . (BACK TO TOP)

Today's sponsored Tech Bytes dives into HashiCorp's Consul product to learn how it’s evolved from its humble beginnings to become a service networking platform with features including a service mesh, service discovery, network infrastructure automation, an API gateway, and more. The post Tech Bytes: Solving Service Networking Problems With HashiCorp’s Consul (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

Today on Day Two Cloud we peel back the curtains on Google Cloud with a GCP insider to find out how Google Cloud differentiates itself, its embrace of a multi-cloud approach, and more. Our guest is Richard Seroter, Director of Outbound Product Management at Google Cloud. This is not a sponsored episode. The post Day Two Cloud 147: Google Cloud Is Not Just For Devs appeared first on Packet Pushers . (BACK TO TOP)

Drew Conry-Murray and Du’An Lightfoot discuss essential skills for IT professionals in 2022. They include learning to code, learning Linux, and sharing your journey. This topic was inspired by a Tweet thread Du'An recently posted. We also talk about the role of content creation such as blogging and videos to enhance your own learning and advance your career. Du'An is a Sr. Cloud Networking Developer Advocate at AWS Cloud. You can follow him on Twitter at @labeveryday. (BACK TO TOP)

Today on the Tech Bytes podcast we’re talking WAN architectures and how to simplify and secure them with sponsor Cloudflare. Cloudflare's Magic WAN is a network-as-a-service offering. Customers can connect data centers, branches, and users to Cloudflare's private network; add security services; and integrate with third-party SD-WANs. The post Tech Bytes: Cloudflare Simplifies Wide Area Networks With Magic WAN (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

This week's Network Break podcast discuss Intel's roadmap for its Infrastructure Processing Units (IPUs). We get more insight into Nokia's deal to provide hardware for Azure, and examine why Juniper has extended its Contrail SDN platform to Kubernetes (hint: because of the cloud). Plus Cisco releases new Wi-Fi capabilities. The post Network Break 382: Intel Charts DPU Roadmap; Juniper Brings Contrail SDN To Kubernetes appeared first on Packet Pushers . (BACK TO TOP)

Today's Heavy Networking podcast explores two new offerings from sponsor Palo Alto Networks. First is Okyo Garde, a home wireless mesh appliance to connect and secure remote workers while reducing the management burden from IT. We also discuss a new licensing program to make provisioning bandwidth for branch and remote offices for Prisma SD-WAN simpler and more flexible. (BACK TO TOP)

https://blog.cloudflare.com/

Pint is a tool we developed to validate our Prometheus alerting rules and ensure they are always working (BACK TO TOP)

The 66th edition of the Eurovision Song Contest, in Turin, Italy, had two semi-finals (May 10 and 12) and a final (May 14), all of them with highlights, including Ukraine’s victory (BACK TO TOP)

Back in December 2021, I joined Cloudflare as a Software Development Intern on the Partnerships team to help improve the experience that Partners have when using the platform (BACK TO TOP)

We’re excited to announce the availability of Network Analytics Logs for maximum visibility into L3/4 traffic and DDoS attacks (BACK TO TOP)

In Cloudflare’s global network, every server runs the whole software stack. Therefore, it's critical that every server performs to its maximum potential capacity (BACK TO TOP)

After many announcements from Platform Week, we’re thrilled to make one more: our Spring Developer Challenge! (BACK TO TOP)

In addition to sharing a general update on where our network performance stands, we’re also sharing updated performance metrics on our Workers platform. We’ve done an extensive benchmark of Cloudflare Workers vs Fastly’s Compute@Edge (BACK TO TOP)

What happens to the Internet traffic in countries where many observe Ramadan? Depending on the country, there are clear shifts and changing patterns in Internet use, particularly before dawn and after sunset (BACK TO TOP)

Cloudflare is going to participate in the research and development of the core infrastructure that helps keep Ethereum secure, fast, as well as energy efficient for everyone (BACK TO TOP)

Today we are excited to announce that our Ethereum and IPFS gateways are publicly available to all Cloudflare customers for the first time (BACK TO TOP)

Today, we're announcing we're bridging the two. We will make it possible for our customers to serve their sites on the IPFS network (BACK TO TOP)

We've developed the IPFS Gateway monitor, an observability tool that runs various IPFS scenarios on a given gateway endpoint. In this post, you'll learn how we use this tool and go over discoveries we made along the way (BACK TO TOP)

This is Part 1 of what will be a year-long series documenting our journey to re-architect our systems to be the best, fastest, most-scalable purge in the industry (BACK TO TOP)

Migrating millions of images into Cloudflare is now simple, fast and at the distance of a few clicks. The new Cloudflare Images Sourcing Kit Allows you to define your image sources, reuse them when you need to add new images or refresh existing ones (BACK TO TOP)

https://cloud.google.com/blog/

Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more.  Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here:  Google Cloud blog 101: Full list of topics, links, and resources . Week of May 16 - May 20, 2022 Machine learning is among the most exciting, fastest-moving technology disciplines.S.ß1.1T.YRHIBID-2.TIME.22.8-gke.21. (BACK TO TOP)

Download  our guidebook to learn how reCAPTCHA Enterprise can help strengthen your website security quickly. Cyber threats on the rise   In 2021, the United States saw 40.5% of website attacks committed through “bad bots” on the internet, with 37.2% of government website traffic being bad bots, according to research by cybersecurity firm Imperva 1 . As cyber threats increase, government agencies need a way to safely let constituents access digital services.  UI challenge vs. References: 1. (BACK TO TOP)

Relational databases are great at processing transactions, but they’re not designed to run analytics at scale. If you're a data engineer or a data analyst, you may want to continuously replicate your operational data into a data warehouse in real time, so you can make timely, data driven business decisions. The operational flow shown in the preceding diagram is as follows: Incoming data from an Oracle source is captured and replicated into Cloud Storage through Datastream. Before you begin 1. 2. (BACK TO TOP)

Almost a decade ago, we started encrypting traffic between our data centers to help protect user privacy. Since then, we gradually rolled out changes to encrypt almost all data in transit. Our approach is described in our Encryption in Transit whitepaper . While this effort provided invaluable privacy and security benefits, software encryption came at significant cost: it took ~0.7% of Google's processing power to encrypt and decrypt RPCs, along with a corresponding amount of memory.com ... (BACK TO TOP)

Do you know how to rightsize a workload in Kubernetes? If you’re not 100% sure, we have some great news for you! Today, we are launching a fully embedded, out-of-the-box experience to help you with that complex task. This workload optimization workflow helps rightsize applications by looking at Kubernetes resource requests and limits , which are often one of the largest sources of resource waste. Not anymore with GKE’s new workload rightsizing capability. Read Article (BACK TO TOP)

We live in a digital world, and the future of work is in the cloud. In fact, 61% of HR professionals believe hiring developers will be their biggest challenge in the years ahead. 1 During your personal cloud journey, it’s critical to build and validate your skills in order to evolve with the rapidly changing technology and business landscape.  Skill badge earners overwhelmingly gain value from and are satisfied with Google Cloud skill badges. 1. Read Article (BACK TO TOP)

The security world keeps changing, with new tools and new threats in the ever-evolving arms race that is cybersecurity. To keep you up to speed on all that Google Cloud is doing to help safeguard your data and your applications, welcome to the first installment of the Security Roundup. In this regular series, I'll be sharing a selection of news and guidance to help ensure you have the resources you need for your hectic, high-stakes harm-preventing job. Learn more with Arman Rye in this video... (BACK TO TOP)

With billions of searches each day, Google is where people turn when they’re looking to buy something, learn about a product, or complete an important task. With Google’s Business Messages , customers can go straight from Google Search to a one-on-one conversation with a brand and quickly get the information they need. Our partners specialize in solutions for a number of verticals like retail, banking, automotive, telco, and many more. albersons. popeyes. videotron. Read Article (BACK TO TOP)

Editor’s note : Here, we look at how Equifax used Google Cloud’s Bigtable as a foundational tool to reinvent themselves through technology. Identifying stolen identities, evaluating credit scores, verifying employment and income for  processing credit requests requires data—truckloads of data—galaxies of data! But it’s not enough to just have the most robust data assets; you have to protect, steward and manage them with precision.  Learn more about Equifax and Cloud Bigtable . Read Article (BACK TO TOP)

Customers are increasingly migrating their workloads to the cloud, including applications that are licensed and charged based on the number of physical CPU cores on the underlying node or in the cluster. To help customers manage and optimize their application licensing costs on Google Cloud VMware Engine , we introduced a capability called custom core counts — giving you the flexibility to configure your clusters to help meet your application-specific licensing requirements and reduce costs. 2. (BACK TO TOP)

Terraform is a popular open source Infrastructure as Code (IaC) tool today and is used by organizations of all sizes across the world. Whether you use Terraform locally as a developer or as a platform admin managing complex CI/CD pipelines, Terraform makes it easy to deploy infrastructure on Google Cloud. With this release, you can now write policies on any resource from Terraform’s google and google-beta providers. Changes to infrastructure are common and in many cases occur often. 2.k8s.cli... (BACK TO TOP)

As sophisticated cyberattack campaigns increasingly target the U.S. public and private sectors during the COVID era, the White House and federal agencies have taken steps to protect critical infrastructure and remote-work infrastructure. However, implementation can be a challenge for many agencies due to cost, scalability, engineering, and a lack of resources.  Today we are announcing Autonomic Security Operations (ASO) for the U.S. We offer integrations to many EDR vendors.S.S. public sector.S. (BACK TO TOP)

There has been an increasing awareness in the developer community, enterprises, and governments of software supply chain risks. Remediation efforts for vulnerabilities like Log4j and Spring4shell, and a 650% year-over-year increase in cyberattacks aimed at open source suppliers, have sharpened focus on the critical task of bolstering the security of open source software. Assured OSS is expected to enter Preview in Q3 2022. This makes us one of the largest contributors to the OSV... Read Article (BACK TO TOP)

At Google Cloud, we’re focused on giving customers new ways to strengthen their security posture. Many organizations use service account keys to authenticate for Google Cloud Platform API access, but managing keys can be challenging, especially in multi-cloud scenarios.  Initially, we supported federating workloads via the Open ID Connect (OIDC) authentication protocol. We are excited to announce today that support for SAML federation is also generally available. Read Article (BACK TO TOP)

Cybersecurity risks remain at the top of every organization’s agenda. As we progress on our Invisible Security journey, we remain focused on delivering solutions that can make governments and enterprises safer with Google, in our trusted cloud and through SaaS products that bring our security capabilities to on-premises environments and other clouds. This helps explain research that shows that there’s a 650% year-over-year increase in cyberattacks aimed at open source software (OSS) suppliers.S. (BACK TO TOP)

Enterprise data backup and recovery has always been one of the most compelling and widely adopted public cloud use cases. That's still true today, as businesses leverage the cloud to protect increasingly critical applications with stricter RTO/RPO requirements. Veeam and Google Cloud have long been leaders at providing reliable, verifiable, cloud-based recovery solutions across any environment or application. We'll focus here on a few that appear to be top of mind with many of our customers. (BACK TO TOP)

Google Cloud is a great home for your high performance computing (HPC) workloads. As with all things Google Cloud, we work hard to make complex tasks seem easy . For HPC, a big part of user friendliness is support for popular tools such as schedulers. If you run high performance computing (HPC) workloads, you’re likely familiar with the Slurm workload manager. You can find these new features today in the Slurm on Google Cloud GitHub repository and on the Google Cloud Marketplace .g.g.g... (BACK TO TOP)

Twitter is an open, social platform that’s home to a world of diverse people, perspectives, ideas, and information. We aim to foster free and global conversations that allow people to consume, create, distribute, and discover information about the topics they care about the most. Founded in 2006, Twitter keeps a watchful eye on emerging technologies to maintain a modern platform that can meet the needs of the changing times. “Mating all this is a nontrivial problem at scale... Read Article (BACK TO TOP)

Cybersecurity remains a top national concern, and Google Cloud is committed to providing government agencies with the security capabilities they need to achieve their missions. At the annual Google Cloud Security Summit today, we’re excited to share updates on how we’re helping governments around the world address their pressing security challenges and meet the demands of new and evolving cybersecurity mandates.S. federal cybersecurity webpage. (BACK TO TOP)

Kubernetes is being used for an ever growing percentage of production applications that power the world. Day 2 operations are now in focus as organizations scale from just a few clusters and applications to many clusters across multiple environments, in one cloud, multiple, and even on premise. They will need to automate as much of this work as possible since managing 1 cluster is very different than managing 10s or 100s across geographies. Read Article (BACK TO TOP)

Bulletin by Jakub Mikians