Skip to content

Latest commit

 

History

History
1696 lines (802 loc) · 91.4 KB

bulletin-2022-09-23.md

File metadata and controls

1696 lines (802 loc) · 91.4 KB

Bulletin for Friday, 23 Sep 2022

7 days digest


Schibsted engineering - Medium (1)


The Technium (1)


Bert Hubert's writings (1)


Kevin Sookocheff (1)


Stratechery by Ben Thompson (1)


Eli Bendersky's website (1)


Slack Engineering (1)


Metadata (1)


Programming Digest (1)


ongoing by Tim Bray (1)


Graham King (1)


Retool blog (1)


The Pragmatic Engineer (1)


Daniel Lemire's blog (1)


Engineering at Meta (1)


Blog - Cobalt Robotics (1)


Computer Things (1)


The Hacker Factor Blog (1)


Notes on software development (1)


dropbox.tech (1)


Stay SaaSy (1)


The Teleport Blog (2)


frankdenneman.nl (2)


PlanetScale - Blog (2)


The Ably Blog (2)


Blog on Tailscale (2)


Krebs on Security (2)


Weaveworks (2)


Earthly Blog (3)


Sentry Blog RSS (3)


Timescale Blog (3)


The CircleCI Blog Feed - CircleCI (3)


Pluralistic: Daily links from Cory Doctorow (4)


Microsoft Security Blog (4)


Amazon Science homepage (5)


Google AI Blog (5)


Stack Overflow Blog (6)


Changelog Master Feed (6)


The Full Feed - All of the Packet Pushers Podcasts (6)


Simon Willison's Weblog: Blogmarks (11)


The Cloudflare Blog (13)


Cloud Blog (13)


https://medium.com/schibsted-engineering

Finally we got to experience a full size, live version of JavaZone in Oslo Spektrum once again! They say that if you wait for something, it is usually worth waiting for. And we couldn’t agree more. Schibsted is a proud partner to JavaZone, the biggest developer conference in Norway, and it was a joy to meet so many engaged people and listen to a variety of truly inspiring talks. Linux powers over 3 billion phones as well as the majority of all servers. You can watch the whole presentation here . (BACK TO TOP)

https://kk.org/thetechnium

Rebuilding the Notre Dame cathedral with medieval tools is possible if you take the long view. https://t.co/CeXvtHeThH — Kevin Kelly (@kevin2kelly) September 14, 2022 This hypothesis is worth tracking: "Plastics may make people obese." https://t.co/sMLMwHg2gF — Kevin Kelly (@kevin2kelly) September 13, 2022 (BACK TO TOP)

https://berthub.eu/articles/

UPDATE: Nu ik niet meer werk voor de TIB kan deze uitleg van de nieuwe wet weer online. Via dit artikel zijn interviews en podcasts te vinden met meer context. Het kabinet heeft een wetsvoorstel gepubliceerd wat het toezicht en de bevoegdheden van de inlichtingen- en veiligheidsdiensten ingrijpend verandert. Tot 17 april was het mogelijk online een reactie in te dienen, en die zijn hier te vinden. (BACK TO TOP)

https://sookocheff.com/

Practical distributed applications are deployed into varied environments and execute on a variety of different machines linked together over a variety of communication infrastructure. The physical machines themselves can differ in the number and speed of processors, the availability of random access and stable storage, and more. The communication infrastructure can differ in the available levels of latency, throughput, and reliability. (BACK TO TOP)

https://stratechery.com

Stratechery is launching a new podcast: Sharp Tech with Ben Thompson. In addition, the Stratechery Update subscription has now been expanded to the Stratechery Plus subscription, including the Stratechery Update, Stratechery Interviews, Sharp Tech, and Dithering. (BACK TO TOP)

https://eli.thegreenplace.net/

Continuing the recent theme of blog posts about Go tooling , this post will briefly discuss how analysis tools interact with one of Go's newest features - generics. As usual, this post provides a motivating example and discusses a couple of approaches to writing a tool. The full code is on GitHub . As a motivating example, let's find all calls to generic functions in a module, and the instantiated type arguments for that call. We'll use this code sample: package main import "golang.Info.Type. (BACK TO TOP)

https://slack.engineering

You grinded LeetCode, nailed the interview process, and got an internship at an amazing company. Congrats! But now it’s week three of your internship, you have no idea how anything works, and you’ve written one line of code in the past two days. How do you ask for help? Whom do you ask for help? […] The post Blocked: How to Ask For Help as an Intern appeared first on Slack Engineering . (BACK TO TOP)

http://muratbuffalo.blogspot.com/

SQLite is the most widely deployed database engine (or likely even software of any type) in existence. It is found in nearly every smartphone (iOS and Android), computer, web browser, television, and automobile. There are likely over one trillion SQLite databases in active use. (If you are on a Mac laptop, you can open a terminal, type "sqlite3", and start conversing with the SQLite database engine using SQL. It has an in-process/embbedded design, and a standalone (no dependencies) codebase ... (BACK TO TOP)

https://programmingdigest.net

sponsor The open source Product OS. Built on the modern data stack. PostHog's open source platform has everything engineering teams need in one place. Product Analytics, Session Recording, Funnels, Feature Flags, Experimentation and more — all seamlessly integrated. And you can self-host, so user data never leaves your infrastructure. Specifically, yourself from 1 year in the future. The Twisted Life of Clippy In the ’90s, Microsoft created an annoying paperclip that it quickly retired. (BACK TO TOP)

https://www.tbray.org/ongoing/ongoing.atom

(BACK TO TOP)

/

In Rust, what is the performance cost of using sync::Once after the initial setup? (BACK TO TOP)

https://retool.com/blog/

In this tutorial, you'll build a tool to manage Salesforce leads using Retool. The app will allow your sales team to enrich and qualify new leads all in one action. (BACK TO TOP)

https://blog.pragmaticengineer.com/

Exclusive details about the collapse of the formerly high-flying startup. Could tech employees have known sooner they were on a sinking ship? (BACK TO TOP)

https://lemire.me/blog

Attractive female students get better grades. They lose this benefit when courses move online. A research paper is much more likely to be highly ranked if the author is famous. The USA has many more prisoners than police officers (three prisoners for every police officer), while every other developed country has the reverse ratio. Diluting … Continue reading Science and Technology links (September 16 2022) (BACK TO TOP)

https://engineering.fb.com/

Many of Meta’s products, such as search, ads ranking and Marketplace, utilize AI models to continuously improve user experiences. As the performance of hardware we use to support training infrastructure increases, we need to scale our data ingestion infrastructure accordingly to handle workloads more efficiently. GPUs, which are used for training infrastructure, tend to double [...] Read More... (BACK TO TOP)

https://www.cobaltrobotics.com

When working in a large code base, searchability, is just as important as readability. You’ll be reading the code to understand it, but you’ll be dependent on search tools like grep to even find what to read. If you can’t find the right code to read, you won’t just be confused, you’ll be left with false […] The post You can’t read code that you can’t find appeared first on Cobalt Robotics . (BACK TO TOP)

https://buttondown.email/hillelwayne

Hi everyone! I know I said there was no newsletter this week, but that doesn’t mean no new content! Last year I was approached by The ReadMe Project , GitHub’s new online zine, to write about formal methods. I decided to focus on decision tables, since they have a great strength-weight ratio and you can learn everything about them in only five minutes. Hence, The five-minute feedback fix .) Normal newsletter should resume next week. (BACK TO TOP)

https://www.hackerfactor.com/blog/

I don't typically write about my works-in-progress. However, I haven't blogged in awhile and I've had a few people write in, asking if I'm okay. Yes, I'm okay -- just a little overworked with unexpected issues. New Location (Soon) First, I've been trying to get a second service location up and running. I run nearly a dozen web services. Most people only know about the public FotoForensics service, FotoForensics Lab (the commercial counterpart to the public site), and Hacker Factor (this blog). (BACK TO TOP)

http://notes.eatonphil.com/

When I wrote the " build a distributed PostgreSQL proof of concept " post I first had to figure out how to use Hashicorp's Raft implementation . There weren't any examples I could find in the Hashicorp repo itself. And the only example I could find was Philip O'Toole's hraftd . It's great! However, I have a hard time following multi-file examples in general. So I built my own single-file example . It's not perfect but it helped me get started and may help you too. Terminal 1: $ .go .db.Store(sp. (BACK TO TOP)

https://dropbox.tech/feed

Over the past few years, server-side request forgery (SSRF) has received an increasing amount of attention from security researchers. With SSRF, an attacker can retarget a request to internal services and exploit the implicit trust within the network. It often escalates into a critical vulnerability, and in 2021 it was among the top ten web application security risks identified by the Open Web Application Security Project. This means an attacker’s access would be limited.dropbox.dropbox.dropbox. (BACK TO TOP)

https://staysaasy.com/

Live footage from Figma’s all-hands I’ve been both a Figma user and enterprise buyer. My team has been a buyer of the standard UX design stack in the last few years: Between Sketch, followed by Invision, then Figma, I’ve signed a lot of design contracts. In my opinion Figma is different in a way that a lot of people may not realize. With Figma getting acquired for approximately 1.3 gazillion dollars by Adobe, here are some quick SaaS and product strategy reactions from a Figma fan. 99. (BACK TO TOP)

https://goteleport.com/blog/

In this blog post, we'll look at how to connect to Microsoft SQL Server remotely using Teleport and Active Directory Authentication. (BACK TO TOP)

Learn how to implement RDP directory sharing using the File System Access API. (BACK TO TOP)

https://frankdenneman.nl/

I’m noticing a trend that more ESXi hosts have Sub-NUMA Clustering enabled. Typically this setting is used in the High-Performance Computing space or Telco world, where they need to reduce every last millisecond of latency and squeeze out every bit of bandwidth the system can offer. Such workloads are mostly highly tuned and operate in […] The post Sub-NUMA Clustering appeared first on frankdenneman.nl . (BACK TO TOP)

Overcome Your AI/ML Challenges with VMware + NVIDIA AI-Ready Enterprise Platform (Presented by VMware, Inc.) [A41422] Tuesday, Sep 20, 8:00 PM – 9:00 PM CEST / 11:00 Pacific Time (PT) Shobhit Bhutani, Justin Murray, and I are honored to present at NVIDIA GTC. In the session, we provide a deep-level overview of the VMware and NVIDIA […] The post VMware Sessions at NVIDIA GTC appeared first on frankdenneman.nl . (BACK TO TOP)

https://planetscale.com

Learn how to use the PlanetScale serverless driver by creating a serverless API in AWS with JavaScript. Read the full story (BACK TO TOP)

Learn how to use Atlas CLI with PlanetScale to define your database as code. Read the full story (BACK TO TOP)

https://ably.com/

Tips on efficient collaboration and how to balance synchronous and asynchronous communication for distributed, remote-first teams. (BACK TO TOP)

Adobe's planned acquisition of Figma points to a buy don't build mindset. (BACK TO TOP)

https://tailscale.com/blog/

Open source is in Tailscale’s bones. After our seed round, when we were only five people making our initial open source plans, we each already had decades of experience writing and using community software. Personally, I’m a Unix programmer only because of a Slackware CD I picked up in Hong Kong in 1995. I owe my livelihood and a big part of my identity to open source. Beyond our instincts to build open source software, we also couldn’t have built Tailscale without it. We get that. (BACK TO TOP)

Tailscale clients make direct connections to each other, almost all the time . To do that, they need reliable communication infrastructure to determine how to connect (using DISCO packets), and a communication path of last resort to use when the local network on one or both ends is hostile enough that direct connections are not feasible. Tailscale runs a global network of DERP relay servers to cover both of these needs. That means you can more quickly and easily establish network connections. (BACK TO TOP)

https://krebsonsecurity.com

A Florida teenager who served as a lackey for a cybercriminal group that specializes in cryptocurrency thefts was beaten and kidnapped last week by a rival cybercrime gang. The teen's captives held guns to his head while forcing him to record a video message pleading with his crew to fork over a $200,000 ransom in exchange for his life. The youth is now reportedly cooperating with U.S. (BACK TO TOP)

Three men in the United Kingdom were arrested this month after police responding to an attempted break-in at a residence stopped their car as they fled the scene. The authorities found weapons and a police uniform in the trunk, and say the trio intended to assault a local man and force him to hand over virtual currencies.  (BACK TO TOP)

https://www.weave.works/

Background Deployment frequency and lead time for changes are a measure of how an elite organization can deliver software on-demand to its users; at the same time, keeping failure and recovery rates low. With many developers now embracing this new trend, the decentralized nature of cloud infrastructure has significantly increased the threat landscape; thus raising many security issues and concerns many companies grapple with. One method we introduce is Trusted application delivery . (BACK TO TOP)

When rolling out a new version of your application, traffic routing is one of the trickiest challenges. Progressive delivery is a way to get the best of both worlds - stable releases, and higher release velocity. Exposing a subset of users to the new version during the evaluation period and keeping other users in the previous version is the gist of progressive delivery. One of the most complicated challenges among these is traffic routing. This method carries a low-risk factor. (BACK TO TOP)

https://earthly.dev/blog/

WSL2 for macOS I like my mac book pro. It’s not an M1, just a 2019 X86 MacBook. But it’s Unix based and POSIX compliant. One thing though, it’s certainly not Linux. If I want a Linux environment on my laptop, I need a VM. Lima (LInux MAchine) is the simplest way I know of to get that virtual machine. Once it’s setup you just type lima in a terminal window to be placed in a Linux VM but with all your files and ports available. It’s like WSL2 but for macOS. Ubuntu Setup Let’s install it. (BACK TO TOP)

The process of building systems to deploy the models that data scientists and machine learning engineers have created is non-trivial. This is because other developers and designers are not always available to create the required APIs and user interfaces. You could decide to learn to use the technologies required for this, but that takes considerable effort and could extend project completion by months. Due to this, you may just resort to leaving the models in notebooks on Github...append(image.. (BACK TO TOP)

Introduction Kubernetes(K8s) is an open source system that automates the deployment , scaling, and management of containerized applications such as microservices. It’s designed to make it easy to deploy applications to a wide range of virtual machines and cloud providers e.g Digital ocean, AWS. K8s is built on a foundation of open standards. It helps you manage the lifecycle of processes running in the container. If you don’t, you can install it by following these instructions . VERSION 0.14.14. (BACK TO TOP)

https://blog.sentry.io

Relay is an open source project by Sentry that receives data from Sentry SDKs for pre-processing. This is done before the data is sent to an… (BACK TO TOP)

Integrating third party dependencies in Flutter In the previous article in this series, we looked at my first impressions, as an iOS… (BACK TO TOP)

We’ve experimented and iterated (a few times) to finally bring the actionability that was once only reserved for errors to Performance. (BACK TO TOP)

https://www.timescale.com/blog/

TimescaleDB expands PostgreSQL query performance by 1000x, reduces storage utilization by 90%, and provides time-saving features for time-series and analytical applications—while still being 100% Postgres. (BACK TO TOP)

The Timescale support engineers assist customers with performance tuning on a daily basis—get some of their practical advice to fine-tune your own settings and make the most of your database. (BACK TO TOP)

Data scientist Andrew Engel relies on TimescaleDB and machine learning to build his time-series forecasting side project. The best part? It’s open source. Check out his two libraries so you can start solving time-series problems while quickly generating features directly within your database. (BACK TO TOP)

https://circleci.com/blog/

Microservice architecture is an application system design pattern in which an entire business application is composed of individual functional scoped services, which can scale on demand. Each team focuses on an individual service and builds it according to their skillset or language of choice. Before the microservices era, enterprises built their applications using monolithic design patterns, which ran on an on-site, high-capacity server (data center). Next is a brief overview of such patterns. (BACK TO TOP)

This tutorial covers: Setting up iOS UI tests with XCUITest and fastlane Automating XCUITest runs using CircleCI Accelerating XCUITest times with parallelism and test splitting In this article, I’ll show you how to reduce the execution time of XCUITest (UI tests on iOS simulators) by splitting and running them in parallel. Automated tests and CI/CD platforms like CircleCI are necessary for iOS application development. Longer build and test time results in slower development speed.4.1.3.x86.3. (BACK TO TOP)

We are excited to announce the new CircleCI Config SDK is now available as an open-source TypeScript library. Developers can now write and manage their CircleCI config.yml files using TypeScript and JavaScript. NPM Package GitHub Repository Docs For developers used to the ecosystem and flexibility of a full-fledged programming language, sometimes YAML can feel limiting or intimidating. With the Config SDK you can define and generate your YAML config from type-safe and annotated JavaScript.jobs.. (BACK TO TOP)

https://pluralistic.net

Today's links Twitch does a chokepoint capitalism: "Amazon is charging Amazon so much money to run the business via Amazon that it has no choice but to take more money from streamers." Hey look at this: Delights to delectate. This day in history: 2007, 2012, 2017, 2021. That's the story we hear about every anticompetitive merger, and it's always a lie. One major efficiency that the Amazon-Twitch merger was supposed to produce? Lower bandwidth costs.twitch. But this is weird." https://twitter.co. (BACK TO TOP)

Today's links Book-banning wingnuts are a tiny, vocal minority: The moral majority is neither. Hey look at this: Delights to delectate. The impact of this wasn't merely in convincing politicians and the press that the views of these unhinged, fringe conspiratorialists should be taken seriously – just as important is the zap it put on the heads of their enemies, the people who wanted to love whom they loved, take care of one another, and let folks be themselves.nature.medium.theguardian.ifixit. (BACK TO TOP)

Today's links How to ditch Facebook without ditching your friends: A new interop design fiction from EFF. Hey look at this: Delights to delectate. This day in history: 2002, 2007, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading How to ditch Facebook without ditching your friends (permalink) Facebook users claim to hate the service, but they keep using it, leading many to describe Facebook as "addictive.eff." https://www.eff.eff.co. (BACK TO TOP)

Today's links Moneylike: My Locus Magazine column about what makes money money. Hey look at this: Delights to delectate. This day in history: 2007, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Moneylike (permalink) My latest column for Locus Magazine is "Moneylike," about the relationship between money, liabilities and coercion: https://locusmag. This was hard. It involves gross acts of coercion. You will do work for that token. (BACK TO TOP)

https://www.microsoft.com/security/blog/

Microsoft discovered an attack where attackers installed a malicious OAuth application in compromised tenants and used their Exchange Online service to launch spam runs. The post Malicious OAuth applications abuse cloud email services to spread spam appeared first on Microsoft Security Blog . (BACK TO TOP)

A fake mobile banking rewards app delivered through a link in an SMS campaign has been making the rounds, targeting customers of Indian banking institutions. Users who install the mobile app are unknowingly installing an Android malware with remote access trojan (RAT) capabilities. The post Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices appeared first on Microsoft Security Blog . (BACK TO TOP)

In this follow-up post in our series about threat hunting, we talk about some general hunting strategies, frameworks, tools, and how Microsoft incident responders work with threat intelligence. The post The art and science behind Microsoft threat hunting: Part 2 appeared first on Microsoft Security Blog . (BACK TO TOP)

With Windows 11, you can protect your valuable data and enable secure hybrid work with the latest advanced security. We're proud to announce the new security features you heard about this spring are now available. The post New Windows 11 security features are designed for hybrid work appeared first on Microsoft Security Blog . (BACK TO TOP)

https://www.amazon.science/

Research from Alexa Speech covers a range of topics related to end-to-end neural speech recognition and fairness. (BACK TO TOP)

University teams are invited to compete to build multimodal conversational agents that assist customers in completing tasks requiring multiple steps. (BACK TO TOP)

Scientists’ paper on probabilistic symbolic execution has significantly influenced software testing and analysis. (BACK TO TOP)

Adapting natural-language-processing techniques to recommendation systems and algorithmic fairness are two central topics at this year’s conference. (BACK TO TOP)

Why detecting damage is so tricky at Amazon’s scale — and how researchers are training robots to help with that gargantuan task. (BACK TO TOP)

http://ai.googleblog.com/

Posted by Jeremy Maitin-Shepard and Laramie Leavitt, Software Engineers, Connectomics at Google Many exciting contemporary applications of computer science and machine learning (ML) manipulate multidimensional datasets that span a single large coordinate system, for example, weather modeling from atmospheric measurements over a spatial grid or medical imaging predictions from multi-channel image intensity values in a 2d or 3d scan.g. >>> dataset = ts.open({ ... 'driver': ..... 'kvstore': ....... (BACK TO TOP)

Posted by Carlos Esteves and Ameesh Makadia, Research Scientists, Google Research A long-standing problem in the intersection of computer vision and computer graphics, view synthesis is the task of creating new views of a scene from multiple pictures of that scene. This has received increased attention [ 1 , 2 , 3 ] since the introduction of neural radiance fields (NeRF). In this post, we present recently published deep learning models for view synthesis. These models have some unique features. (BACK TO TOP)

Posted by Weicheng Kuo and Anelia Angelova, Research Scientists, Google Research, Brain Team Natural language enables flexible descriptive queries about images. The interaction between text queries and images grounds linguistic meaning in the visual world, facilitating a better understanding of object relationships, human intentions towards objects, and interactions with the environment.” Lastly, none of the models can generalize sufficiently well beyond their training data and categories. 3).g. (BACK TO TOP)

Posted by Cat Armato, Program Manager, Google This week, the 23rd Annual Conference of the International Speech Communication Association (INTERSPEECH 2022) is being held in Incheon, South Korea, representing one of the world’s most extensive conferences on research and technology of spoken language understanding and processing. In addition, online attendees are encouraged to visit our virtual booth in GatherTown where you can get up-to-date information on research and opportunities at Google. (BACK TO TOP)

Posted by Santiago Balseiro, Staff Research Scientist, Google Research, and Associate Professor at Columbia University, and Vahab Mirrokni, Distinguished Scientist, Google Research The emergence of digital technologies has transformed decision making across commercial sectors such as airlines, online retailing, and internet advertising. Today, real-time decisions need to be repeatedly made in highly uncertain and rapidly changing environments.g. The action (e.g. (BACK TO TOP)

https://stackoverflow.blog

The days of traditional application monitoring are fading. Applications today are no longer a single program, but a network of services connected by API and RPC endpoints across cloud containers that are created and removed as needed. The post Five nines uptime without developer burnout (Ep. 488) appeared first on Stack Overflow Blog . (BACK TO TOP)

Developers are always trying to shorten the distance between thinking of a solution and coding. How much does the integration of hardware and software in your everyday tooling help? The post Can integrating hardware with software save developers time and energy? (Ep. 487) appeared first on Stack Overflow Blog . (BACK TO TOP)

Serial entrepreneur Arpit Mohan, cofounder and CTO of Appsmith, tells Ben and Cassidy about his path to building Appsmith, an open-source project that makes it easy for engineers to build, ship, and maintain internal tools. The post A serial entrepreneur finally embraces open source (Ep. 486) appeared first on Stack Overflow Blog . (BACK TO TOP)

Absent a time machine, telling others how to avoid my mistakes is the best I can do. The post I spent two years trying to do what Backstage does for free appeared first on Stack Overflow Blog . (BACK TO TOP)

AI-assisted cheating, clarity vs. code confidence, and (not so) Critical CSS The post The Overflow #143: Modern Perl appeared first on Stack Overflow Blog . (BACK TO TOP)

When a company hits a period of hypergrowth, developers are in for a thrill ride. They need to start scaling their systems, moving to service architectures and clouds, and looking to solve problems others haven’t. But hypergrowth brings headaches, too, and chief among them is how to keep everyone aware of what’s going on with teams that they aren’t a part of.  The post Hypergrowth headaches (Ep. 485) appeared first on Stack Overflow Blog . (BACK TO TOP)

https://changelog.com/master

In this episode, we will be exploring interviewing as a Software Engineer. Tips, tricks, and gotchas, as well as potentially some interviewing horror stories and red flags to avoid at all costs. We’re joined by Emma Draper, Engineering Manager at the New York Times based in Arizona, and Kate Jonas, goes by Jonas, Technical Enablement Manager at Datadog based in Denver. (BACK TO TOP)

Dave Farley, co-author of Continuous Delivery, is back to talk about his latest book, Modern Software Engineering, a Top 3 Software Engineering best seller on Amazon UK this September. Shipping good software starts with you giving yourself permission to do a good job. It continues with a healthy curiosity, admitting that you don’t know, and running many experiments, safely, without blowing everything up. And then there is scope creep… (BACK TO TOP)

WeightWatcher, created by Charles Martin, is an open source diagnostic tool for analyzing Neural Networks without training or even test data! Charles joins us in this episode to discuss the tool and how it fills certain gaps in current model evaluation workflows. Along the way, we discuss statistical methods from physics and a variety of practical ways to modify your training runs. (BACK TO TOP)

Andreas Kling’s new cross-platform browser project, Dan Hollick’s nerdy deep-dive on QR code tech, Stephan Dilly’s Rust-based terminal UI for Git, Miłosz Piechocki’s opinion on junior vs senior engineers & Divam Gupta’s Tensorflow port of Stable Diffusion. (BACK TO TOP)

This week on The Changelog we’re talking about Stable Diffusion, DALL-E, and the impact of AI generated art. We invited our good friend Simon Willison on the show today because he wrote a very thorough blog post titled, “Stable Diffusion is a really big deal.” You may know Simon from his extensive contributions to open source software. We talk from all the angles of this topic, the technical, the innovation, the future and possibilities, the ethical and the moral – we get into it all. (BACK TO TOP)

Austin Gil joins the show and KBall continues an old email correspondence about the JS community and growth. Then, the gang plays a round of TIL where Austin shares his learnings about the HTML capture attribute. Finally, Austin shares what it’s like to have a blog post blow up. (BACK TO TOP)

https://packetpushers.net

On today's IPv6 Buzz podcast we explore DHCPv6 Option 108. Option 108 basically allows a DHCP server to use IPv4 to contact a host and tell that host to disable its IPv4 stack and switch to IPv6-only. In other words, you're using IPv4 to turn off IPv4. We examine the use cases for this peculiar capability. The post IPv6 Buzz 110: The Peculiar Power Of DHCPv6 Option 108 appeared first on Packet Pushers . (BACK TO TOP)

Today on the Day Two Cloud podcast, we talk DevSecOps and how it's more than just a marketing term. We also discuss Infrastructure as Code (IaC) and IT as Code and what that actually means for operations folks. It doesn't mean you have to write code all day, but we make an effort to put some specifics around what an Ops person should know when it comes to code. The post Day Two Cloud 164: DevSecOps Is A Real Thing appeared first on Packet Pushers . (BACK TO TOP)

On today's Full Stack Journey podcast we welcome guest Eric Chou, an author, educator, and network engineer. From traditional network engineering to the birth of "cloud" at Amazon and now working to share his knowledge via blog posts, videos, books, and classes, Eric shares lessons learned on his career journey. The post Full Stack Journey 070: A Network Automation Career Journey With Eric Chou appeared first on Packet Pushers . (BACK TO TOP)

Wi-Fi 6E gear can take advantage of the 6GHz band, but there are incumbent entities that also have a stake in the spectrum. To prevent interference, the Automated Frequency Coordination database coordinates among licensed and unlicensed users. On today’s Tech Bytes podcast, sponsored by Aruba, we’ll hear about Aruba’s participation in the first public demonstration of Wi-Fi 6E and the AFC database. My guest is Dave Wright, Head of Global Wireless Policy at Aruba. (BACK TO TOP)

This week's Network Break podcast covers new capabilities for data center automation in Juniper Apstra, new encryption-friendly Arista routers, and why climate change risks should factor into your IT planning. The startup Veego is pitching an end user experience app to ISPs, the Google spin-out Aalyria looks to build networks using free-space optics, and Microsoft announces Azure Orbital Cloud Access that uses Starlink to connect remote sites to Azure. (BACK TO TOP)

A full zero trust architecture goes up and down the stack, bringing in policy and enforcement strategies from the application layer, all the way down into the network. On today's Heavy Networking podcast we discuss zero trust network access, or ZTNA, with sponsor Fortinet. ZTNA is but one part of a robust zero trust architecture, but what a crucial component it is. Alex Samonte, Director of Technical Architecture, joins us to get into nerdy specifics about Fortinet’s ZTNA. (BACK TO TOP)

http://simonwillison.net/

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

https://blog.cloudflare.com/

Logpush jobs can now be filtered to contain only logs of interest. Also, you can receive alerts when jobs are failing, as well as get statistics on the health of your jobs (BACK TO TOP)

Third party tools are the only thing you can’t control on your website, unless you use Managed Components with Cloudflare Zaraz (BACK TO TOP)

API Shield customers can save, update, and monitor the performance of API endpoints (BACK TO TOP)

The Iranian government has disrupted Internet connectivity in response to recent protests over the death of a woman while in police custody (BACK TO TOP)

With Regional Services, we are thrilled to expand our coverage to these countries in Asia Pacific, allowing more customers to use Cloudflare by giving them precise control over which parts of the Cloudflare network are able to perform advanced functions (BACK TO TOP)

Log Storage on R2: a cost-effective solution to store event logs for any of our products (BACK TO TOP)

Cloudflare Images now supports storing and delivering SVG files (BACK TO TOP)

Custom Domains are now in Generally Available! Today we go through Part 1 in a series on building completely serverless applications on Cloudflare’s Developer Platform (BACK TO TOP)

With Workers for Platforms, your customers can build custom logic to meet their needs right into your application. We’re excited to announce that Workers for Platforms is now in GA for all Enterprise customers (BACK TO TOP)

Stream Live is now out of beta, available to everyone, and ready for production traffic at scale (BACK TO TOP)

R2 is now generally available!! R2 gives developers object storage minus the egress fees (BACK TO TOP)

Cloudflare started using Area 1 in 2020 and proceeded with acquiring the company in 2022. We were most impressed how phishing, responsible for 90+% of cyberattacks, basically became a non-issue overnight when we deployed Area 1. But our vision is much bigger than preventing phishing attacks (BACK TO TOP)

Defend any network from browser-borne threats with Cloudflare Browser Isolation by connecting legacy firewalls over IPsec / GRE (BACK TO TOP)

https://cloud.google.com/blog/

We recently announced the launch of Google Public Sector , a new Google subsidiary focused on helping U.S. federal, state, and local governments, and educational institutions accelerate their digital transformations. In just the few months since the introduction of Google Public Sector, we’ve seen continued momentum. We announced that Google Workspace has achieved the U.S. Department of Defense’s (DOD) Impact Level 4 (IL4) authorization .S. Navy, Defense Innovation Unit , and the U.S. 31.S.S. (BACK TO TOP)

Editor’s note : Earlier this year, we heard from Gojek , the ​​on-demand services platform, about the open-source data ingestion tool it developed for use with data warehouses like BigQuery. Today, Gojek VP of Engineering Ravi Suhag is back to discuss the open-source data transformation tool it is building. In a recent post , we introduced Firehose , an open source solution by Gojek for ingesting data to cloud data warehouses like Cloud Storage and BigQuery . Read Article (BACK TO TOP)

The network security that firewalls provide is one of the basic building blocks for a secure cloud infrastructure. We are excited to announce that three new Google Cloud Firewall features are now generally available: Global Network Firewall Policies , Regional Network Firewall Policies , and IAM-governed Tags .  With these enhancements, Cloud Firewall can help you more easily achieve a Zero Trust network posture with a fully distributed, cloud-native stateful inspection firewall service. (BACK TO TOP)

As a Korean technology leader specializing in digital transformation (DX), LG CNS partners with customers to help them achieve digital growth across fields including cloud, artificial intelligence (AI), big data, smart factory, and smart logistics. Towards the end of 2020, LG CNS was investigating how to drive digital transformation and growth within their own ranks to demonstrate and extend their core competitive advantage as a consulting service and system integration service provider. (BACK TO TOP)

Java and Go vulnerability scanning support Google Cloud’s Container Scanning API now automatically scans Maven and Go packages for vulnerabilities. With the Container Scanning API enabled, any containers including Java (in Maven repositories) and Go language packages that are uploaded to an Artifact Registry repository will be scanned for vulnerabilities. This capability builds on existing Linux OS based vulnerability detection and provides customers with deeper insight into their applications.. (BACK TO TOP)

We’re fortunate to work with some of the world’s most innovative customers on a daily basis, many of whom come to Google Cloud for our well-established expertise in data analytics and AI. As we’ve worked and partnered with these data leaders, we have encountered similar priorities among many of them: to remove the barriers of data complexity, unlock new use cases, and reach more people with more impact. Consider these the data hors d’oeuvres to your October 11 data buffet. Read Article (BACK TO TOP)

TL;DR - The best way to analyze your billing data is to set up the billing data export to BigQuery. We've created an interactive tutorial to help you through the process ! In this last post , we went over a few different options to analyze your Google Cloud billing data. The most powerful and comprehensive way to work with your billing data is to enable exporting to BigQuery. BigQuery is a great choice for analyzing data, where you can run queries against your data. I don't know SQL... (BACK TO TOP)

Join us online or in-person at Google Cloud Next ’22 , our flagship event where over 1 million people across the globe come together to learn and grow.  Don’t miss out on meeting other IT and security professionals, developers, and business leaders. Learn about the latest product announcements and hear valuable insights from Google executives, including Thomas Kurian, Google Cloud CEO,  and Aparna Pappu, VP and GM for Google Workspace.  2. 3. 4. 5. 6. 7. 8. We hope to see you there. Read Article (BACK TO TOP)

Compliance officers and platform engineering teams often find it challenging to ensure security, manage consistency, and oversee governance across multiple products, environments, and teams. Google Cloud's Organization Policy Service can help tackle this challenge with a policy-based approach that simplifies policy administration across Google Cloud resources and projects.  Let’s break down five ways Custom Organization Policy can help engineering organizations improve security and efficiency... (BACK TO TOP)

Analytics data is growing exponentially and so is the dependence on the data in making critical business and product decisions.  In fact, the best decisions are said to be the ones which are backed by data. In data, we trust!   But do we trust the data ?  As the data volumes have grown - one of the key challenges organizations are facing is how to maintain the data quality in a scalable and consistent way across the organization.g. Apache Airflow ). Read Article (BACK TO TOP)

Editor's note: This blog was originally published  in Ukrainian  on September 14. 2022. Google launches cloud technology training program to support Ukrainian businesses and IT professionals  Around the world, organizations across multiple industries are in the midst of digitally transforming their businesses. And Ukrainian businesses are no different - they are looking for new ways to survive, grow and thrive digitally in an unstable and uncertain environment.  More details are here . (BACK TO TOP)

In the fast-moving world of security, Google Cloud continues to constantly update our products and services to help protect your data and your applications. In the second installment of this regular series, let’s dive into what’s new and cooking in Google Cloud Security. To help protect your External keys, Cloud External Key Manager (EKM) recently launched EKM over VPC that will provide your application with an extra layer of security. Read Article (BACK TO TOP)

We’re excited to announce the General Availability of cross-project service referencing with Internal HTTP(S) Load Balancing and Regional External HTTP(S) Load Balancing . This new capability allows organizations to configure one central load balancer and route traffic to hundreds of services distributed across multiple different projects. You can centrally manage all traffic routing rules and policies in one URL map. 1. 2. 3. 4... Read Article (BACK TO TOP)

Bulletin by Jakub Mikians