Skip to content

Latest commit

 

History

History
1664 lines (791 loc) · 95.3 KB

bulletin-2022-05-27.md

File metadata and controls

1664 lines (791 loc) · 95.3 KB

Bulletin for Friday, 27 May 2022

7 days digest


Irrational Exuberance (1)


Computer Things (1)


Almost Secure (1)


Eugene Yan (1)


Monzo - Technology (1)


Writing - rachelbythebay (1)


Retool Blog (1)


Perspectives (1)


Think Fast, Talk Smart: Communication Techniques (1)


jacobian.org (1)


The Hacker Factor Blog (1)


LinkedIn Engineering (1)


Bert Hubert's writings (1)


Stratechery by Ben Thompson (1)


Daniel Lemire's blog (1)


Metadata (1)


LogicAI website (1)


Netflix TechBlog - Medium (1)


Vallified (2)


Google AI Blog (2)


The Ably Blog (2)


Tech at Meta (2)


Schibsted engineering - Medium (2)


Weaveworks (3)


Timescale Blog (3)


The CircleCI Blog Feed - CircleCI (3)


PlanetScale - Blog (4)


Earthly Blog (4)


Microsoft Security Blog (4)


Pluralistic: Daily links from Cory Doctorow (5)


Blog – Hackaday (5)


Amazon Science Homepage (5)


Changelog Master Feed (5)


Stack Overflow Blog (6)


The Cloudflare Blog (7)


The Full Feed - All of the Packet Pushers Podcasts (7)


Towards Data Science - Medium (10)


Cloud Blog (20)


https://lethain.com/

I’ve been in a handful of discussions over the past few weeks about plagiarization: how should authors approach their work being directly or indirectly copied? When I started writing online in 2007, I was writing to learn to write, and my early stuff showed that, by which I mean it wasn’t very good. As I moved towards management, I was particularly inspired by Michael Lopp’s blog , who was, for me, a rare and thoughtful writer on engineering management. Rewrites come in many forms. (BACK TO TOP)

https://buttondown.email/hillelwayne

Hey everyone! We gotta start with some housekeeping. First, you might have noticed that the newsletter email’s changed. Several people informed me that Gmail was sending the newsletter to spam and Buttondown suggested I send from a custom domain to fix it. There shouldn’t be any changes needed on your end, though if you have message filters you might need to update them. And you can still email [email protected] if you see any issues. For the record, my usual cap is four . God help me. (BACK TO TOP)

https://palant.info/

Everyone has received the mails trying to extort money by claiming to have hacked a person’s webcam and recorded a video of them watching porn. These are a bluff of course, but the popular Screencastify browser extension actually provides all the infrastructure necessary for someone to pull this off. A website that a user visited could trick the extension into starting a webcam recording among other things, without any indications other than the webcam’s LED lighting up if present.70.0. .g.69.0. (BACK TO TOP)

https://eugeneyan.com

Mindset, 100-day plan, and balancing learning and taking action to earn trust. (BACK TO TOP)

https://monzo.com/blog/technology

With over 2000 microservices and lots of Remote Procedure Calls (RPCs) that are constantly changing, we needed a new way to manage staff access. The Security Platform team explain how we now define RPC permissions directly in proto files. (BACK TO TOP)

https://rachelbythebay.com/w/

Not everything at a big company involves writing code. Sometimes, you have to do a bunch of meta stuff in order to manage the projects. These are two stories of doing exactly that. ... Have you ever seen what happens when a team has a long list of "to-do" items and has no idea where to start? Have you had to sit there and witness the circular conversations of people trying to attach priority values like P0, P1, P2 to those items? Did they then still have no idea where to begin? "AB-123 is a P0.. (BACK TO TOP)

https://retool.com/blog/

In this article, you’ll learn how to build a slider in React with react-slider, a popular little component / library that Zillow open sourced back in 2021. We’ll cover how to customize the various components of the slider (dimensions, values, colors, etc.). (BACK TO TOP)

https://perspectives.mvdirona.com

Today we’re making the AWS Graviton3 processor generally available in the AWS EC2 C7g Instances. Graviton3 and EC2 C7g Instance Type General Availability Video Graviton3 is the third generation of the AWS Graviton CPUs and it continues to raise the bar on performance.  Graviton is one of our 4 semiconductor product lines here at AWS.... (BACK TO TOP)

https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast

Why do we do what we do? What factors drive us? And how do things like competition with others help us achieve our goals? These are the questions most interesting to  Szu-chi Huang , an associate professor of marketing with a specific interest in motivation. “Competition definitely increases motivation,” says Huang. “It makes attaining the goal more valuable. Think Fast, Talk Smart   is a podcast produced by Stanford Graduate School of Business.com/privacy#do-not-sell-my-info . (BACK TO TOP)

https://jacobian.org/

Answering a question from a reader: how do you deal with misalignment – arguments about skills, pay, etc. – when hiring? (BACK TO TOP)

https://www.hackerfactor.com/blog/

About once a week, the public FotoForensics service receives some kind of user request. On rare occasions, these are comments from spam bots, like "fdsa" or "increase your SEO". More often, they are the typical removal or unban requests. However, sometimes even these common requests stand out. Unban Request Most unban requests are very straightforward. The person didn't realize that they couldn't upload IDs or porn. They apologize and are quickly unbanned. Bans last for 90 days.... Thanks.168.1. (BACK TO TOP)

https://engineering.linkedin.com/blog.rss.html

At LinkedIn, our engineering teams build what’s needed to connect the world’s professionals to economic opportunity. For the Partner Solutions Engineering (PSE) team, this includes the technology that powers our talent and hiring solutions and support for how jobs get posted on the LinkedIn platform. However, having multiple ingestion methods has made it difficult for some of them to […] (BACK TO TOP)

https://berthub.eu/articles/

As presented on the 24th of May 2022 at the European Energy Law Seminar 2022 organized by the Dutch Energy Law Association (NeVER), in cooperation with the University of Groningen’s Centre of Energy Law and Sustainability and the University of Oslo’s Scandinavian Institute of Maritime Law So before we delve into the fascinating relation between cybersecurity and the worlds of oil, gas, energy and electricity, I need to introduce myself a bit. (BACK TO TOP)

https://stratechery.com

Warner Bros. Discovery is a company that makes a lot of sense, both because of its content and also its strategy, which treats streaming as an additional channel, not a reason-for-being. (BACK TO TOP)

https://lemire.me/blog

Many recent Intel processors benefit from a new family of instructions called AVX-512. These instructions operate over wide registers (up to 512 bits) and follow the Single instruction, multiple data (SIMD) paradigm. These new AVX-512 instructions allow you to break some speed records, such as decoding base64 data at the speed of a memory copy. Most … Continue reading Parsing JSON faster with Intel AVX-512 (BACK TO TOP)

http://muratbuffalo.blogspot.com/

The rise of data-intensive “Web 2.0” Internet services has led to popular new Object-Relational Mapping (ORM) programming frameworks. Rather than adopting the use of traditional transactional programming primitives, the ORM framework developers use feral (application-level) mechanisms for maintaining database integrity. They specify declarative correctness criteria/invariants (through validations and associations) and have the ORM enforce the criteria on their behalf. No, Mr...01 locks, 1.e. (BACK TO TOP)

http://logicai.io/blog/

Introduction KaggleDays x Z by HP championship is a series of events that are conducted in collaboration with Z by HP as the sponsors with LogicAI and Kaggle as the organizers. The Championship consists of 12 online meetups held across the globe every 3 to 4 weeks with a final in-person event in Barcelona, Spain. Participants are expected to develop machine learning solutions that can solve the given problem with the best performance to place at the top of the leaderboard. More than 91. (BACK TO TOP)

https://netflixtechblog.com

At Netflix, we want to entertain the world through creating engaging content and helping members discover the titles they will love. Key to that is understanding causal effects that connect changes we make in the product to indicators of member joy. To measure causal effects we rely heavily on AB testing , but we also leverage quasi-experimentation in cases where AB testing is limited. Many scientists across Netflix have contributed to the way that Netflix analyzes these causal effects. (BACK TO TOP)

https://www.philipotoole.com

rqlite is an open-source, lightweight, distributed relational database, which uses SQLite as its storage engine. It’s trivial to deploy, and easy to use. Release 7.5.0 adds Queued Writes. This is the first time rqlite allows users to trade-off durability for much higher write performance. Why offer Queued Writes? rqlite has been in development for about … Continue reading rqlite 7.5.0: Trading durability for performance → The post rqlite 7.5. (BACK TO TOP)

rqlite is a lightweight, open-source, distributed relational database written in Go, which uses SQLite as its storage engine. It passed a milestone this month, in the open-source world, by gaining 10,000 stars on GitHub. The post rqlite reaches 10,000 stars on GitHub appeared first on Vallified . (BACK TO TOP)

http://ai.googleblog.com/

Posted by Pasin Manurangsi and Chiyuan Zhang, Research Scientists, Google Research Over the last several years, there has been an increased focus on developing differential privacy (DP) machine learning (ML) algorithms. DP has been the basis of several practical deployments in industry — and has even been employed by the U.S. Census — because it enables the understanding of system and algorithm privacy guarantees.3%, a result that relies on handcrafted visual features.g. (BACK TO TOP)

Posted by Zirui Wang and Jiahui Yu, Research Scientists, Google Research, Brain Team Oftentimes, machine learning (ML) model developers begin their design using a generic backbone model that is trained at scale and with capabilities transferable to a wide range of downstream tasks. In computer vision, pioneering work has shown the effectiveness of single-encoder models pre-trained for image classification to capture generic visual representations that are effective for other downstream tasks. (BACK TO TOP)

https://ably.com/

This article explains how Ably complements Kafka to reach end-users at the edge. (BACK TO TOP)

Learn how to build a realtime betting app using Confluent Cloud and the Ably edge messaging platform. (BACK TO TOP)

https://tech.fb.com

Maher Saba Job Title: Head of Remote Presence and Engineering Years at Meta: 9  Education: Purdue University, BS Electrical Engineering; University of Texas at Austin, MS Computer Science  Hometown: Damascus, Syria Tell us about your role at Meta. What do industry colleagues tend to find unique or cool about your job? Maher Saba: I support […] The post Leadership at Meta: Maher Saba appeared first on Tech at Meta . (BACK TO TOP)

–  We have developed a new embodied AI platform, called MyoSuite, that applies machine learning (ML) to biomechanical control problems by unifying motor and neural intelligence.  –  The musculoskeletal models in MyoSuite are up to 4,000x faster than other simulators at meeting the data requirements of modern ML algorithms – This research could have significant […] The post MyoSuite: An embodied AI platform that unifies neural and motor intelligence appeared first on Tech at Meta . (BACK TO TOP)

https://medium.com/schibsted-engineering

Intro Since I work with JavaScript, I have often found myself in a position where I was discussing with my colleagues if we should use null or undefined. I’ve spent a lot of my time explaining my point of view and justifying my choices but as always in JS there are many aspects to consider and many ways to achieve the result. It’s noteworthy that both null and undefined could work in your project if you are using them in a smart way. Let’s consider some examples here. Let’s look into that. (BACK TO TOP)

Women in Tech Conference 2022 — An inspiring day! “And once the storm is over, you won’t remember how you made it through, how you managed to survive. You won’t even be sure, whether the storm is really over. But one thing is certain. When you come out of the storm, you won’t be the same person who walked in. That’s what this storm’s all about. However, moving this needle has been difficult as even the most aggressive of campaigns have proven to be slow. I then went on to a focus session crawl. (BACK TO TOP)

https://www.weave.works/

Kubernetes is an incredibly powerful platform, but let’s face it: the developer experience can involve a steep learning curve. With this in mind, we recently hosted a webinar in collaboration with James Governor from Redmonk , entitled ‘ DX, Guardrails, Golden Paths & Policy Management in Kubernetes ’. If you missed it, you can watch the recording here . On the one hand, you could see it as what James called “a golden era for tooling”. We would love to hear from you! <p> </p> (BACK TO TOP)

Azure Kubernetes Service (AKS) and Azure Arc-enabled Kubernetes for Hybrid and Multicloud Environments When it comes to enterprise platforms, Microsoft has a long history of providing solutions to the complex environment of the global and fast changing enterprise landscape. Azure Kubernetes Service (AKS) , with its tight integration with Azure Active Directory (Azure AD) and Azure Policy , is a managed Kubernetes offering focused on satisfying those needs. (BACK TO TOP)

About Lunar Lunar  is a 100% digital bank and a FinTech company that strives to democratize the power of money and the way we spend and invest it. Headquartered in Aarhus, Denmark, Lunar operates in Denmark, Sweden, and Norway serving its 500,000 active customers with a team of 650+ employees. Having received over €345 in funding, Lunar’s valuation is currently at $2.25B. Here are the key challenges: 1. Deliver a seamless developer experience Lunar has been an early adopter of Kubernetes. 3. (BACK TO TOP)

https://www.timescale.com/blog/

How does OpenTelemetry differ from previous observability tools? And can these differences open a new path to an old friend as a unified query language for telemetry data? (BACK TO TOP)

This blog post could almost have been written by the API that our friends at NLP Cloud created. But it wasn’t. 😎 Read how NLP Cloud monitors their API, which allows customers to add language AI to their apps in several programming languages without having to handle MLOps. (BACK TO TOP)

Instrumenting your code with OpenTelemetry traces is a manual effort that requires considerable time and effort. With tobs, OpenTelemetry Operator, and Promscale, you can deploy—with a single command— a complete pre-configured observability stack in Kubernetes. (BACK TO TOP)

https://circleci.com/blog/

If you are new to Docker, you may find it challenging to understand all the terms. It can seem like everyone has a different idea of what Docker terms mean, and sometimes, terms get used interchangeably. For instance, you — like others who are learning about Docker — may wonder how a Docker image differs from a Docker container. Their contrasts are subtle but significant. Solomon Hykes introduced Docker as an open-source project in 2013. This removes the need to install each dependency manually. (BACK TO TOP)

This tutorial covers: Cloning and setting up a sample React and Redux app Writing tests for the application Configuring continuous integration for automating testing React continues to be the web framework of choice for many UI developers, surpassing jQuery as the most popular framweork in the 2021 Stack Overflow Developer Survey . It provides an intuitive model for building data-driven user interfaces, and efficiently updates the DOM when this data changes.22.com/CIRCLECI-GWP/react-jest-enzyme. (BACK TO TOP)

This tutorial covers: Building a RESTful API with Golang using the Gin-gonic framework Writing and running tests for endpoints Automating tests Gin is a high-performance HTTP web framework written in Golang. It contains features and functionalities like routing and middleware out of the box. This helps to reduce boilerplate code, improves productivity, and simplifies the process of building microservices. I will also lead you through building an API to manage the basic details of a company...7. (BACK TO TOP)

https://planetscale.com

Insights gives you a faster way to debug and monitor your PlanetScale database queries Read the full story (BACK TO TOP)

Use PlanetScale connect to easily perform ELT (Extract, Load, Transform) actions on your data to fulfill your application needs. Read the full story (BACK TO TOP)

Put your data where your users and applications are. Read the full story (BACK TO TOP)

We believe databases are lagging behind DevOps innovation and we wrote these principles to illustrate the path forward. Read the full story (BACK TO TOP)

https://earthly.dev/blog/

Kubernetes networking enables the components that make up the Kubernetes ecosystem, like containers, pods, and services, to communicate effectively with each other. As a result, networking permeates Kubernetes. Because Kubernetes is primarily a distributed system, it relies on networks to operate effectively. Therefore, a guide discussing Kubernetes networking is an invaluable resource to anyone interested in Kubernetes. Kubernetes also provides various types of container networking solutions . (BACK TO TOP)

Homebrew made some changes to where it installs packages if you are running it on a new M1 Mac, and these changes may throw you for a loop if you’re moving over to an M1 from Intel. In this article I’ll talk about what changed and why it changed. I’ll also walk you through getting all your Homebrew packages from your Intel Mac reinstalled on your M1, and share a couple of issues I came across after migrating that will hopefully help you with any gotchas you encounter in the future...sh)" .brew. (BACK TO TOP)

There are many reasons engineers look to Kubernetes when running their workloads, like support for containers and orchestration. Another major reason for choosing Kubernetes, though, is being able to automatically scale the services found within a cluster. Configuring and using autoscaling within your cluster is a great way to make sure that the nodes within your cluster are using the optimal amount of resources, as running at a hundred percent isn’t advisable. One of these tools is Lens . (BACK TO TOP)

When you start learning about Kubernetes, you quickly learn about the key components that you need in order to run your applications, such as pods, deployments, and persistent volumes, but the components that aren’t absolute necessities often come a little later in your learning journey. One of these components is namespaces, which helps you isolate workloads. This comes in handy when you have several different projects under the same cluster. This is why you want isolation. (BACK TO TOP)

https://www.microsoft.com/security/blog

The privilege escalation hacking tool KrbRelayUp is a wrapper that can streamline the use of some features in Rubeus, KrbRelay, SCMUACBypass, PowerMad/ SharpMad, Whisker, and ADCSPwn tools in attacks. Although this attack won’t function for Azure Active Directory (Azure AD) joined devices, hybrid joined devices with on-premises domain controllers remain vulnerable. (BACK TO TOP)

Amplification attacks are one of the most common distributed denial of service (DDoS) attack vectors. These attacks are typically categorized as flooding or volumetric attacks, where the attacker succeeds in generating more traffic than the target can process, resulting in exhausting its resources due to the amount of traffic it receives. The post Anatomy of a DDoS amplification attack appeared first on Microsoft Security Blog . (BACK TO TOP)

Risk management plays a critical role in helping organizations with their security posture enhancement. Taking insider incidents as an example, they are not only costly to organizations but also time-consuming to be contained. As such, the ROI is maximized in effectively protecting the organizations’ assets as well as ensuring their business operations. Risk management is an ongoing activity. (BACK TO TOP)

Web skimming campaigns now employ various obfuscation techniques to deliver and hide the skimming scripts. It’s a shift from earlier tactics where attackers conspicuously injected the malicious scripts into e-commerce platforms and content management systems (CMSs) via vulnerability exploitation, making this threat highly evasive to traditional security solutions. The post Beneath the surface: Uncovering the shift in web skimming appeared first on Microsoft Security Blog . (BACK TO TOP)

https://pluralistic.net

Today's links Attacking machine learning training by re-ordering data: Boy it's hard to audit an AI. This day in history: 2012, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Attacking machine learning training by re-ordering data (permalink) We have increasingly outsourced our decision-making to machine learning models ("the algorithm"). There are real consequences to this.go.mediamatters. I mean, super wrong. https://memex.craphound. (BACK TO TOP)

Today's links Talking with Kim Stanley Robinson about "The High Sierra": An interview for Fatherly Magazine. Kim Stanley Robinson's "The High Sierra": A love story. Hey look at this: Delights to delectate. At one point, Robinson told me it would be his last book. Thankfully, he changed his mind, but I can see why he'd think of this as a career capstone. https://www.littlebrown.net, my surveillance-free, ad-free, tracker-free blog: https://pluralistic.fatherly. You yourself are a forest.fatherly. (BACK TO TOP)

Today's links HSBC: "Who cares if Miami is underwater?": Scenes from the "Moral Money Summit." Hey look at this: Delights to delectate. This day in history: 2002, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading HSBC: "Who cares if Miami is underwater?" (permalink) Before I tell you about how HSBC just announced it wants to literally render the planet Earth unfit for human habitation, I want to talk about HSBC's other crimes.icij. (BACK TO TOP)

Today's links SPACs were hugely successful (for banks): But you lost your shirt. Hey look at this: Delights to delectate. This day in history: 2002, 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading SPACs were hugely successful (for banks) (permalink) Remember SPACs? For a while, you couldn't turn around without hearing about a celeb who was backing a "blank check" IPO. The company has no business, no products, nothing.1. (BACK TO TOP)

Today's links Podcasting "About Those Killswitched Ukrainian Tractors": Good spaceships don't have self-destruct buttons. Hey look at this: Delights to delectate.medium.com/about-those-kill-switched-ukrainian-tractors-bc93f471b9c8 In case you missed the underlying story, here's a quick recap. Russian looters, abetted by the Russian military, stole $5m worth of tractors and combines from a Deere dealership in Melitopol, Ukraine. https://www.cnn.html A lot of people sent me this story.latimes.eff. (BACK TO TOP)

https://hackaday.com

If there’s any one thing that the average hacker is short on at a given moment (besides chips), it’s transient small part storage. Just as new projects are built from …read more (BACK TO TOP)

What do you call someone who gives the toddler in your life a musical instrument as a gift? In most cases, “mortal enemy” is the correct answer, but not everyone …read more (BACK TO TOP)

Robotic arms and actuators are compelling things to watch, and as popular among the maker set as they are crucial to modern industry. [kthod2000] built a design of their own, …read more (BACK TO TOP)

You might have heard of the cochlear implant. It’s an electronic device also referred to as a neuroprosthesis, serving as a bionic replacement for the human ear. These implants have …read more (BACK TO TOP)

There are times when a technology goes almost overnight as if in a puff of smoke, and others when they fade away gradually over time to the point at which …read more (BACK TO TOP)

https://www.amazon.science/

Reformulating the mapping problem to take advantage of sequence-to-sequence Transformers improves performance by an average of 15%. (BACK TO TOP)

Program empowers Black, Latinx, and Native American students to become industry leaders through scholarship, research, and career opportunities. (BACK TO TOP)

Amazon fulfillment centers use thousands of mobile robots. To keep products moving, Amazon Robotics researchers have crafted unique solutions. (BACK TO TOP)

Three of Amazon’s leading roboticists — Sidd Srinivasa, Tye Brady, and Philipp Michel — discuss the challenges of building robotic systems that interact with human beings in real-world settings. (BACK TO TOP)

Guido Imbens elected to the National Academy of Sciences; Alberto Abadie elected to American Academy of Arts and Sciences. (BACK TO TOP)

https://changelog.com/master

The Berlin tech ecosystem was all about PHP/Python for a long time. In the recent years it became a tech hub and an early adopter of Go. In this conversation we’ll see how this reflects in the 10+ years old Go meetup, with the meetup organizing team. (BACK TO TOP)

This is the post-KubeCon CloudNativeCon EU 2022 week. Gerhard is talking to Matt Moore, founder & CTO of Chainguard about all things Knative and Sigstore. The most important topic is swag, because none has better stickers than Chainguard. The other topic is the equivalent of Let’s Encrypt for securing software. (BACK TO TOP)

This week we’re talking with Bruce Schneier — cryptographer, computer security professional, privacy specialist, and writer (of many books). He calls himself a “public-interest technologist”, a term he coined himself, and works at the intersection of security, technology, and people. (BACK TO TOP)

Today we are at KubeCon CloudNativeCon EU 2022, talking to Adolfo García Veytia about securing Kubernetes releases. Adolfo is a Staff Software Engineer at Chainguard, and one of the technical leads for SIG release, meaning that he helps ship Kubernetes. You most likely know him as Puerco, and have seen first-hand his passion for securing software via SBOMs, cosign and SLSA. Puerco’s love for bikes and Chainguard are a great match 🚴‍♂️ (BACK TO TOP)

In 2020, Shawn (swyx) Wang wrote: Every 10 years there is a changing of the guard in JavaScript. I think we have just started a period of accelerated change that could in thge future be regarded as the Third Age of JavaScript. We’re now in year three of this third age and Swyx joins us to look back at what he missed, look around at what’s happening today, and look forward at what might be coming next. (BACK TO TOP)

https://stackoverflow.blog

Lists are useful data structures, but sometimes you need to show the context between items. The post The complete beginners guide to graph theory appeared first on Stack Overflow Blog . (BACK TO TOP)

With so much hype and hate around Web3, let's take a measured look at what it is and what it can do. The post Web3 skeptics and believers both need a reality check appeared first on Stack Overflow Blog . (BACK TO TOP)

The home team covers the hiring freezes and layoffs hitting the tech sector, burnout among freelancers and applicants for tech jobs, the dubious ethics of unpaid internships, and how to make Twitter safer by preemptively blocking people. The post Turns out the Great Resignation goes both ways (Ep. 445) appeared first on Stack Overflow Blog . (BACK TO TOP)

All those CEOs on LinkedIn claiming they can find the right candidate in a five-minute conversation? Wrong. Science shows us how we can do better. The post The science of interviewing developers appeared first on Stack Overflow Blog . (BACK TO TOP)

Welcome to ISSUE #126 of The Overflow! This newsletter is by developers, for developers, written and curated by the Stack Overflow team and Cassidy Williams. This week: the new Developer Survey is here and ready for your input, whether amateurs can add value to math research, and the problems with yellow in design systems. From the… The post The Overflow #126: The 2022 Developer Survey now open appeared first on Stack Overflow Blog . (BACK TO TOP)

The home team talks about the past, present, and future of crypto; good reasons to go public with your open-source project before you think you should; and the importance of test-driven development. The post Make your open-source project public before you’re ready (Ep. 444) appeared first on Stack Overflow Blog . (BACK TO TOP)

https://blog.cloudflare.com/

Cloudflare’s approach to handling firmware vulnerabilities and how we keep our internal data protected (BACK TO TOP)

Learn how the Product Content Experience team treats developer documentation and in-product content like a product (BACK TO TOP)

Now we’re happy to announce we will return more error code types and include additional helpful information to further improve your debugging experience. (BACK TO TOP)

How we redesigned our DNS pipeline to significantly improve DNS propagation speed across all zones. (BACK TO TOP)

I am excited to announce that I have joined Cloudflare as Managing Director for the Middle East and Turkey (MET) region (BACK TO TOP)

Cloudflare now has a second major international privacy certification, as well as C5 attestation — and we’re not done yet. (BACK TO TOP)

No one excited me more than Cloudflare, so I joined.](https://blog.cloudflare.com/wendy-komadina-no-one-excited-me-more-than-cloudflare-so-i-joined/)

When I considered joining Cloudflare, I recall consistently reading the message around “Helping to Build a Better Internet”. At first those words didn’t connect with me, but they sounded like an important mission. (BACK TO TOP)

https://packetpushers.net

If you're a security or network professional wondering if your skills aren't as applicable or useful when it comes to public cloud, don't worry: they are very, very useful. On today's Day Two Cloud podcast we talk with Brandon Carroll on how to properly map traditional infrastructure and network security to public cloud deployments. The post Day Two Cloud 148: Understanding Cloud Security Roles And Responsibilities appeared first on Packet Pushers . (BACK TO TOP)

Welcome to the inaugural episode of Kubernetes Unpacked, a new podcast in the Packet Pushers Community Channel. The goal of this podcast is to help IT professionals understand Kubernetes: how it works; how and why it's used; how to deploy, operate, and manage the platform on premises and in the cloud; Kubernetes networking and security concepts; and more. The post Kubernetes Unpacked 001: Prerequisites For Kubernetes Success appeared first on Packet Pushers . (BACK TO TOP)

Welcome to this sponsored Tech Bytes episode with HashiCorp, where we focus on how HashiCorp's Consul product helps automate network infrastructure. We also dig into what’s included in the Enterprise version of Consul. Joining us today is Hari Sankaran from the Consul product team. The post Tech Bytes: HashiCorp’s Consul Tackles Network Infrastructure Automation (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

This week's Network Break discusses a new threat containment feature from Rubrik to prevent companies from re-infecting themselves via compromised backups. F5 has released patches for a serious vulnerability in its Big-IP load balancer, cyber insurers raised premiums by as much 92% last year, and more IT news. The post Network Break 383: Cyber Insurers Realize Customers Have Terrible Security; F5’s Big Vulnerability appeared first on Packet Pushers . (BACK TO TOP)

Today on the Tech Bytes podcast we talk with Managed Service Provider (MSP) and VMware partner of the year Softchoice on how Softchoice helps customers navigate multi-cloud and hybrid cloud deployments using VMware. We cover details about two real-world Softchoice/VMware customer use cases: a Major League Baseball team and a financial services firm. The post Tech Bytes: MSP Softchoice And VMware Tackle Hybrid And Multi-Cloud Deployments (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

Today on the Tech Bytes podcast we talk with sponsor Palo Alto Networks about two new approaches for supporting remote and hybrid workers. First is Okyo Garde, a new wireless mesh product to support remote work. And second, a new bandwidth-on-demand option for Palo Alto’s Prisma SD-WAN. The post Tech Bytes: Palo Alto Networks Introduces Security As Flexible As Today’s Hybrid Workforce (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

On today's Heavy Networking we talk about why it's important to say "No" when someone tries to put more work on you than you can handle. Guest Tom Hollingsworth wrote a controversial blog post entitled “No Is A Complete Sentence” about how to say "No," to even when it's hard to do. We talk about the nuances of this stance, the risks you take when you do, time management, balancing workloads, and more. The post Heavy Networking 631: Saying No appeared first on Packet Pushers . (BACK TO TOP)

https://towardsdatascience.com

Ideas and Explanations behind the complement to Data Warehouses Continue reading on Towards Data Science » (BACK TO TOP)

In this tutorial we will go over using cloud services such as Azure Functions and Cognitive to build a sentiment analysis service Continue reading on Towards Data Science » (BACK TO TOP)

Causal AI — Enabling Data-Driven Decisions Understand how Causal AI frameworks and algorithms support decision making tasks like estimating the impact of interventions, counterfactual reasoning and repurposing previously gained knowledge on other domains. Source: https://pixabay.com/illustrations/ai-artificial-intelligence-sci-fi-7111802/ 1. Among other factors, regular business training, increasing communication, employee recognition is identified by model to influence the final outcome. 2. .e. (BACK TO TOP)

Make your python codes run smoothly Continue reading on Towards Data Science » (BACK TO TOP)

Ask three questions to be better the next time Continue reading on Towards Data Science » (BACK TO TOP)

Legacies of Statistics & AI A deeper look at the untold history of p-values and its legacy Disclaimer: I’ll be putting quotes around certain words, like race, racial measurements”, etc. because not only are these terms loaded with historical discrimination, but “race” is un-scientific. A “race” of people is an un-scientific term. Also, the reader should have a bit of familiarity with p-values, hypothesis testing, and Bayes’ theorem. This is wrong .wikipedia. Pretty unsurprising…I know.wikipedia. (BACK TO TOP)

A Concrete Set of Skills You Should Learn! Continue reading on Towards Data Science » (BACK TO TOP)

Understand and find the best parameters for your time-series basic modeling Continue reading on Towards Data Science » (BACK TO TOP)

Defining Big Data and its potential threats Continue reading on Towards Data Science » (BACK TO TOP)

The ins and outs of how broadcasting works under the hood Continue reading on Towards Data Science » (BACK TO TOP)

https://cloud.google.com/blog/

The Google Cloud DORA team has been hard at work releasing our yearly  Accelerate State of DevOps report . This research provides an independent view into the practices and capabilities that organizations, irrespective of their size, industry, and region, can employ to drive better performance.  The table below highlights elite, high, medium, and low performers at a glance from the last report. We will release the guidebook in chapter increments... Read Article (BACK TO TOP)

The State of DevOps report by Google Cloud and the DORA research team is the largest and longest running research of its kind with inputs from over 32,000 professionals worldwide. It provides an independent view into the practices and capabilities that organizations, irrespective of their size, industry, and region, can employ to drive better performance.   Today, Google Cloud and the DORA research team are excited to announce the launch of the 2022 State of DevOps survey .e... Read Article (BACK TO TOP)

Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more.  Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here:  Google Cloud blog 101: Full list of topics, links, and resources . Week of May 23 - May 27, 2022 Artifact Registry now supports new repository types. Apt and Yum repositories are now generally available.S.ß1.1T.22. (BACK TO TOP)

We’ve recently improved Cloud Bigtable’s observability by allowing customers to monitor and observe hot tablets. We now provide customers access to real-time hot tablets data through the Cloud Bigtable Admin API and gcloud command-line tool.  In this post, we’ll present how hot tablets observability can be used in real world use cases to help customers understand better design choices based on access patterns and provide insight into performance-related problems... Read Article (BACK TO TOP)

Recently, at Google I/O, we announced AlloyDB for PostgreSQL , a fully-managed, PostgreSQL-compatible database for demanding, enterprise-grade transactional and analytical workloads. Imagine PostgreSQL plus the best of the cloud: elastic storage and compute, intelligent caching, and AI/ML-powered management. Designed for mission-critical applications, AlloyDB offers extensive data protection and an industry leading 99.99% availability SLA, inclusive of maintenance. Analytical queries, i.e. 2.43. (BACK TO TOP)

Building a more integrated ecosystem to keep your enterprise secure It isn’t always clear where your next threat will come from, but being prepared is the best possible response plan. As you steer your enterprise through an increasingly complex world, you need to be ready to thwart cyberattacks online. But protection against online threats requires more than securing an endpoint or browser - it requires securing the full computing stack, from silicon to cloud. Stay tuned for updates. (BACK TO TOP)

Extending Chrome’s Security Insights to Google Workspace and Google Cloud Today, we announced the Chrome Enterprise Connectors Framework , a better way for businesses to easily integrate Chrome browser with popular security platforms such as Splunk, Palo Alto Networks, and CrowdStrike. This will help protect users when they:  Navigate to a known malicious site.  Download or upload files containing known malware. Reuse corporate passwords on non-approved sites. Related Article Read Article (BACK TO TOP)

The typical smart factory is said to produce around 5 petabytes of data per week . That’s equivalent to 5 million gigabytes, or roughly 20,000 smartphones. Managing such vast amounts of data in one facility, let alone a global organization, would be challenging enough. Doing so on the factory floor, in near-real-time, to drive insights, enhancements, and particularly safety, is a big dream for leading manufacturers. This is the new world of edge computing. Read Article (BACK TO TOP)

PostgreSQL uses transaction IDs (also called TXIDs or XIDs) to implement Multi-Version Concurrency Control semantics (MVCC). The PostgreSQL documentation explains the role of XIDs as follows: PostgreSQL's MVCC transaction semantics depend on being able to compare transaction ID (XID) numbers: a row version with an insertion XID greater than the current transaction's XID is “in the future” and should not be visible to the current transaction. In short, catastrophic data loss. (.....).g.g.0 to 1. (BACK TO TOP)

With networking at the foundation of all cloud deployments and business processes, proactively maintaining network health is mission-critical. The cloud is powerful and dynamic, but can sometimes feel complex, as customers often encounter network issues from unintentionally deploying suboptimal or error-prone configurations.  With Network Analyzer, customers can transform reactive workflows into proactive processes and reduce network and service downtime. Read Article (BACK TO TOP)

Editor’s note: Gordon Lucas, Global Head of Digital Engineering at Costa Coffee, explains how Google Maps Platform helps direct customers to each of its 4,000 plus Costa Coffee shops across the world, as well as streamline payments, and optimize deliveries. When brothers Sergio and Bruno Costa opened the first Costa Coffee in central London in 1971, they relied on word of mouth to grow trade.   Fast forward 50 years and we have more than 4,000 coffee shops spread over 31 countries. (BACK TO TOP)

Gartner® named Google as a Leader in the 2022 Magic Quadrant™ for Cloud AI Developer Services report. This evaluation covered Google’s language, vision and structured data products including AutoML, all of which we deliver through Google Cloud. We believe this recognition is a reflection of the confidence and satisfaction that customers have in our language, vision, and AutoML products for developers.   Developers benefit in many ways by using Cloud AI services and solutions.S. (BACK TO TOP)

As a provider of software and services for global enterprises, Google Cloud understands that the quality and security of products is instrumental in maintaining trust among our customers. We are committed to providing products and services that help our customers meet their quality management objectives, ultimately helping organizations to meet their regulatory and customer requirements. As with ISO 9001, Google Cloud’s QMS is predicated on seven quality management principles. Here’s why. (BACK TO TOP)

Many developers use content management systems, plugins, and other software solutions to create websites and apps. Until now, adding mapping functionality to those experiences was a disjointed process that caused many users to quit before ever adding a map to their project. Today we’re announcing Quick Start Widget to help developers make it easier for their users to get started with Google Maps Platform, generate an API key, and embed maps in their websites and apps. (BACK TO TOP)

We’re excited to announce Confidential Computing on the latest Google Compute Engine N2D and C2D Virtual Machines. At Google Cloud, we’re constantly striving to deliver performance improvements and feature enhancements. Last November, we announced the general availability of general-purpose N2D machine types running on 3rd Gen AMD EPYC™ processors . Then, in February, we announced the general availability of compute-optimized C2D machine types running on the same 3rd gen processors... (BACK TO TOP)

We’re continuing to expand our global footprint — and we’re doing it rapidly. In 2020, we announced our plans to launch a new cloud region to help accelerate the economic recovery and growth of Spain. Today, we’re excited to announce that our new Google Cloud region in Madrid is officially open. The new Madrid region joins our network of 33 regions throughout the globe, helping local Spanish businesses connect with users everywhere. You can join us at our region celebration on May 25 here . . (BACK TO TOP)

In the cloud era, modern applications are assembled from services running across different environments. The benefit of this approach is that organizations can choose which services to use that best serve their needs when building applications. These solutions include three core networking solutions that allow you to more efficiently orchestrate services into cohesive applications, and include: New Cloud Load Balancers based on the Open Source Envoy Proxy. fig 2. fig 3. fig 4. fig 5. fig 6. (BACK TO TOP)

If data is currency in today’s digital environment, then organizations should waste no time in making sure every business user has fast access to data-driven insights.   Informatica and Google Cloud are working together to make it happen. We’re excited to share that Informatica will provide a free service on Google Cloud called Informatica Data Loader for Google BigQuery, which accelerates data uploads and keeps data flowing so that people can get to the insights and answers they need faster... (BACK TO TOP)

The following blog covers some common processes and tools used to migrate databases from on-premises (Physical or VMware) to Google Cloud VMware Engine (GCVE). Many customers choose this lift-and-shift migration approach as a first step to quickly migrate databases into Google Cloud before beginning database upgrade and modernization workstreams.  Google Cloud VMware Engine GCVE is a fully-managed service that lets you run the VMware platform in Google Cloud.ora and listener. Read Article (BACK TO TOP)

Editor's note : In today's guest post we hear from Gramercy Tech on their experience working with Google Cloud's serverless technologies as both a customer and vendor. Large events are always a lot of work. By leveraging the pre-provisioned infrastructure of Cloud Run in multiple regions and global load balancing, the team could focus on content and event experiences. With Cloud SQL we were able to establish read replication globally... Read Article (BACK TO TOP)

Bulletin by Jakub Mikians