Skip to content

Latest commit

 

History

History
1526 lines (716 loc) · 82.3 KB

bulletin-2022-10-28.md

File metadata and controls

1526 lines (716 loc) · 82.3 KB

Bulletin for Friday, 28 Oct 2022

7 days digest


A Few Thoughts on Cryptographic Engineering (1)


Speculative Branches (1)


The Pragmatic Engineer (1)


Robert Heaton | Blog (1)


Tech at Meta (1)


frankdenneman.nl (1)


Bert Hubert's writings (1)


High Scalability (1)


LinkedIn Engineering (1)


Vallified (1)


Schibsted engineering - Medium (1)


Slack Engineering (1)


Engineering at Meta (1)


Daniel Lemire's blog (1)


Perspectives (1)


ongoing by Tim Bray (1)


Retool blog (1)


Eli Bendersky's website (1)


Irrational Exuberance (1)


Stratechery by Ben Thompson (1)


Project Zero (1)


jacobian.org (1)


Computer Things (1)


Programming Digest (1)


Think Fast, Talk Smart: Communication Techniques (1)


Blog on Tailscale (2)


Weaveworks (2)


Earthly Blog (2)


Sentry Blog RSS (2)


Spotify Engineering (2)


PlanetScale - Blog (2)


Timescale Blog (2)


Simon Willison's Weblog: Blogmarks (2)


The CircleCI Blog Feed - CircleCI (3)


Google AI Blog (3)


The Full Feed - All of the Packet Pushers Podcasts (4)


Pluralistic: Daily links from Cory Doctorow (5)


Changelog Master Feed (6)


The Cloudflare Blog (6)


Stack Overflow Blog (7)


Microsoft Security Blog (7)


Amazon Science homepage (7)


Cloud Blog (11)


https://blog.cryptographyengineering.com

One of the things I like to do on this blog is write about new research that has a practical angle. Most of the time (I swear) this involves writing about other folks’ research: it’s not that often that I write about work that comes out of my own lab. Today I’m going make an … Continue reading One-Time Programs → (BACK TO TOP)

https://specbranch.com/

I have recently been immersed in the theory and practice of random number generation while working on Arbitrand, a new high-quality true random number generation service hosted in AWS. Because of that, I am starting a sequence of blog posts on randomness and random number generators. This post is the first of the sequence, and focuses what random number generators are and how to test them. (BACK TO TOP)

https://blog.pragmaticengineer.com/

Google, Microsoft, Facebook and Amazon have all dramatically slowed or frozen hiring. How will this impact the rest of the tech industry? (BACK TO TOP)

https://robertheaton.com

Three men were accused of selling firearms to South London gangs. At their 2012 trial in Croydon Crown Court, the prosecution played the jury a recording, taken undercover, of the trio allegedly arranging a sale. But the men’s lawyers claimed that the recording was a fake, and that the police had fabricated it by splicing together clips taken at different times. The hum seeps into microphones and recordings, which is a pain for sound engineers, but surprisingly useful for forensic analysts. 1... (BACK TO TOP)

https://tech.fb.com/

Meta has adopted Kotlin as its new primary language for Android development — moving away from Java. Why it matters: Kotlin has become a popular language for Android development and offers several advantages over Java. Migrating our Android codebase to Kotlin will make our development workflows more efficient overall. Background: Meta’s Android repository reaches across […] The post How Meta switched Android development to Kotlin appeared first on Tech at Meta . (BACK TO TOP)

https://frankdenneman.nl/

There seems to be some misunderstanding about the new vSphere 8 CPU Topology Device Assignment feature, and I hope this article will help you understand (when to use) this feature. This feature defines the mapping of the virtual PCIe device to the vNUMA topology. The main purpose is to optimize guest OS and application optimization. […] The post vSphere 8 CPU Topology Device Assignment appeared first on frankdenneman.nl . (BACK TO TOP)

https://berthub.eu/articles/

This is a page about some of the mechanics of ‘big data’, specifically how to store, transfer and process perhaps 100s of millions or billions of rows/events. Although some people think big data starts at 65k rows, at which point Excel used to lose it, I’m talking about gigabytes of data here. Infrastructure for this kind of thing abounds. Data can however come from lots of sources, and go to lots of different places. (BACK TO TOP)

http://highscalability.com/blog/

  There's a move to regulate cloud providers by vertically separating the services they offer. Like railroads of yore, who were not allowed to provide freight services on top of their base services, cloud providers would not be allowed to provide services on top of their base platform services. Vertical separation would be new to the cloud industry. Is it a good idea? Would it actually solve any problems? My answers are no and no, but probably not for the reasons you think. Let's dive in.com/. (BACK TO TOP)

https://engineering.linkedin.com/blog.rss.html

LinkedIn’s Next Play culture celebrates transformational growth and internal mobility, and engineering leader Shalini is its biggest champion. Based in Silicon Valley, this mom of three walks us through her impactful career journey from our LinkedIn consumer and data teams, then to working on the LinkedIn Sales Solutions team, to now working for LinkedIn Talent Solutions. As my career propelled forward, and I transitioned to managing a team of backend, […] (BACK TO TOP)

https://www.philipotoole.com

rqlite is a lightweight, open-source, distributed relational database written in Go, which uses SQLite as its storage engine. Replicated, a company which helps software vendors ship software to end users, recently migrated from PostgreSQL to rqlite. Along the way their input substantially helped improve how rqlite runs on Kubernetes — and as a result rqlite … Continue reading Replacing Postgres with rqlite → The post Replacing Postgres with rqlite appeared first on Vallified . (BACK TO TOP)

https://medium.com/schibsted-engineering

The world is developing quickly. Not so long ago, if you had forgotten to bring your wallet to a store, you would have a lot of trouble getting what you came to buy — but these days, we’re all very familiar with the opportunities of mobile payments. Most of us have even heard the name of the technology behind this payment method — NFC, which stands for Near Field Communication. They send radio waves to activate the receiving device, such as a smartphone. This is done using intent filters.xml. (BACK TO TOP)

https://slack.engineering

At Slack, we use Terraform for managing our Infrastructure, which runs on AWS, DigitalOcean, NS1, and GCP. Even though most of our infrastructure is running on AWS, we have chosen to use Terraform as opposed to using an AWS-native service such as CloudFormation so that we can use a single tool across all of our […] The post How We Use Terraform At Slack appeared first on Slack Engineering . (BACK TO TOP)

https://engineering.fb.com/

We’re sharing lessons learned from shifting our Android development from Java to Kotlin. Kotlin is a popular language for Android development and offers some key advantages over Java.  As of today, our Android codebase contains over 10 million lines of Kotlin code. We’re open sourcing various examples and utilities we used to manipulate Kotlin code [...] Read More... The post From zero to 10 million lines of Kotlin appeared first on Engineering at Meta . (BACK TO TOP)

https://lemire.me/blog

I have spent the last few years programming often in C++. The C++ langage is probably one of the hardest to master. I still learn something new every week. Furthermore, C++ is getting upgrades all the time: C++17 was a great step forward and C++20 brings even more exiting improvments. In C++, we often use … Continue reading Book Review : Template Metaprogramming with C++ (BACK TO TOP)

https://perspectives.mvdirona.com

I introduced the 2022 National Academy of Engineering Frontiers of Engineering conference on September 21st. The National Academy of Engineering was founded in 1964 is part of The National Academies of Sciences, Engineering, and Medicine. The NAE operates under the same congressional act of incorporation that established the National Academy of Sciences, signed in 1863 by President... (BACK TO TOP)

https://www.tbray.org/ongoing/ongoing.atom

(BACK TO TOP)

https://retool.com/blog/

In this tutorial, you'll build a tool to manage HubSpot leads using Retool. The app will allow your sales team to enrich and qualify new leads all in one place. (BACK TO TOP)

https://eli.thegreenplace.net/

Proxy servers are an interesting and important part of network programming. This post is the first in a series describing how to implement simple proxy servers in Go and how to work with existing proxy servers. For simplicity, this post focuses on unencrypted HTTP traffic. More advanced proxying techniques with encryption will be covered in subsequent posts. The full code of all the samples presented here is available on GitHub . The client accesses many different servers through this proxy.0.0. (BACK TO TOP)

https://lethain.com/

This is a mailbag of several different questions I’ve been asked over the past few weeks. I’d also presume that the follow up question is pushing the candidate to offer an approach to trying to measure the immeasurable topic. My general thinking rules here are: Some present values can be measured directly, e.g. uptime, time to close tickets over past week All present values can be measured indirectly through a proxy measurement (see also Forecasting synthetic metrics ) , e.g.g.g.g.g. (BACK TO TOP)

https://stratechery.com

Understanding the path the semiconductor industry took to today both shows where China needs to go and also explains why the risks for geopolitical conflict are higher than ever. (BACK TO TOP)

https://googleprojectzero.blogspot.com/

By James Forshaw, Project Zero I've been spending a lot of time researching Windows authentication implementations, specifically Kerberos. In June 2022 I found an interesting issue number 2310 with the handling of RC4 encryption that allowed you to authenticate as another user if you could either interpose on the Kerberos network traffic to and from the KDC or directly if the user was configured to disable typical pre-authentication requirements.1 definition from RFC4120.....1.DLL on the server. (BACK TO TOP)

https://jacobian.org/

Stop doing performance reviews based on the calendar year. Instead, schedule performance reviews around each person’s individual calendar — a year after they join the team, switch roles, get promoted, etc. (BACK TO TOP)

https://buttondown.email/hillelwayne

Last week Gabriella Gonzalez wrote What does “isomorphic” mean (in Haskell) , which covers isomorphism from a first-principles perspective. At the very end she says In my experience, the more you train your ability to reason formally about isomorphisms the more you broaden your ability to recognize disparate things as equivalent and draw interesting connections between them. I want to expand a bit more on how they’re useful. Isomorphisms Let’s start with an example. Take the string "abc" . F.  ↩ (BACK TO TOP)

https://programmingdigest.net

sponsor The open source Product OS. Built on the modern data stack. PostHog's open source platform has everything engineering teams need in one place. Product Analytics, Session Recording, Funnels, Feature Flags, Experimentation and more — all seamlessly integrated. And you can self-host, so user data never leaves your infrastructure. this week's favorite When life gives you lemons, write better error messages Error messages are part of our daily lives online. (BACK TO TOP)

https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast

What’s the secret to coming up with good ideas? For Jeremy Utley, it’s about generating as many as possible.  The director of executive education at the Stanford d.school, Utley says, “very few problems we face in business or in life have a single right answer.” All ideas — the good, the bad, and the ugly — are “a necessary input to an innovation process,” and an essential step in getting to solutions that will actually work. See Privacy Policy at https://art19.com/privacy#do-not-sell-my-info . (BACK TO TOP)

https://tailscale.com/blog/

Today, we’re launching a web-based SSH client: Tailscale SSH Console. From the Tailscale admin console, admins will now see a little “SSH…” button to connect to devices running Tailscale SSH . Click this, and you’ll pop open an SSH client, right in your browser. Tailscale SSH Console is now available in beta. To start a Tailscale SSH Console session, click “SSH” on the device, select the username you want to connect as, and reauthenticate. Web-based SSH clients aren’t new. (BACK TO TOP)

If you’re managing and using Tailscale along with several other users, it’s hard to keep track of what changes get made, even with audit logs . For example, another admin might make an update, or an event that you need to react to could occur — such as a node needing authorization . Webhooks are owned by the tailnet, so any webhooks set up by an admin will continue to work even if that admin leaves the company. To set up a webhook, navigate to the webhooks tab of the admin console . (BACK TO TOP)

https://www.weave.works/

Automation was the original benefit of DevOps, but GitOps is what enables automation without the downside of poor security, and things breaking in production. As infrastructure, networking and more start getting defined as code, all its inherent artifacts like configuration management, provisioning manifests, runbooks, deployment scripts, and packages become testable as code. Policy as code makes this possible. This is counterproductive. If not, changes are automatically reverted. (BACK TO TOP)

Kubernetes is witnessing wide adoption by organizations across industries. Its deployment capabilities with zero downtime, resilient infrastructure, automatic rollbacks, high scalability, and self-healing features are primarily due to its deployment capabilities. But the one benefit that separates it from others is that it simplifies the complexity of managing containers at scale. Kubernetes achieves this through a powerful concept called nodes. A node, in turn, can run multiple Pods. (BACK TO TOP)

https://earthly.dev/blog/

Introduction By default, computer programs are executed sequentially, usually line-by-line. Although this is very efficient, you may need to run multiple processes simultaneously or control the flow and runtime of your programs for numerous reasons. Luckily, Go gives us a way to run various processes concurrently or in parallel. Concurrency comes in handy for speed, process synchronization, and resource utilization. What Is Concurrency? “Concurrency is about dealing with lots of things at once. (BACK TO TOP)

Container orchestration tools automate container management tasks, such as scheduling, scaling, load balancing, and networking . Orchestrators have become the standard way to run containerized workloads in production. They solve many of the challenges of successful container operation by abstracting low-level concepts and providing solutions for common problems. Orchestrators allow you to rapidly deploy containers and scale them across multiple physical hosts.io .k3s.githubusercontent.4.k3s.24. (BACK TO TOP)

https://blog.sentry.io

Sentry is an open source company, and it’s important to us to financially support our non-commercial colleagues in the community as we… (BACK TO TOP)

In the first three parts of this series around improving performance in your Django applications, we focused on database, code optimization… (BACK TO TOP)

https://engineering.atspotify.com/

TL;DR The core motivation for Spotify’s Client Platform (CliP) team is empowering and unblocking client developers and giving teams the tools they need to ensure a happy and satisfying developer experience (DX). In line with this, we wanted to improve the coding experience for our development teams through infrastructure changes. We conducted research among 318 [...] The post How We Improved the Development Experience for our Client Developers appeared first on Spotify Engineering . (BACK TO TOP)

TL;DR As part of Spotify’s goal to reach net zero emissions by 2030, we’ve made climate action one of our five technology pillars and have been integrating sustainability into our everyday engineering practices. This year, climate action was the theme of our company-wide Hack Week, we made climate responsibility part of our official engineering handbook, [...] The post Bringing the Climate Fight to Your IDE appeared first on Spotify Engineering . (BACK TO TOP)

https://planetscale.com

Vitess 15 is now generally available with updates to VTOrc, VTAdmin, MySQL compatibility, and more. Read the full story (BACK TO TOP)

How Vitess can increase your database‘s resilience, scalability, and performance Read the full story (BACK TO TOP)

https://www.timescale.com/blog/

Elasticsearch and Cassandra have traditionally been the only two databases recommended to store Jaeger traces in production. Learn how you can now use PostgreSQL as a certified, durable, reliable storage for Jaeger with Promscale. (BACK TO TOP)

Hello faster queries and decreased storage costs! Learn more about the three biggest benefits of migrating to the new Timescale continuous aggregates. (BACK TO TOP)

http://simonwillison.net/

(BACK TO TOP)

(BACK TO TOP)

https://circleci.com/blog/

Reliability update 2022-10-27 Last month, I made a commitment to you that I’d bring you monthly updates on our reliability work: how it’s going, what’s working, and where we still have work to do. In the software community, we all suffer when services go down, but we advance together by sharing our learnings. Last month (scroll down for the full update), I shared that we’d been working on isolating parts of our platform in order to protect customers’ builds and keep them running.circleci.com. (BACK TO TOP)

Container runner, a new container-friendly self-hosted runner, is now available for all CircleCI users. Self-hosted runners are a popular solution for customers with unique compute or security requirements. Container runner reduces the barrier to entry for using self-hosted runners within a containerized environment and makes it easier for central DevOps teams to manage running containerized CI/CD jobs behind a firewall at scale.yml file.1 jobs: build: docker: - image: cimg/base:2021. (BACK TO TOP)

This tutorial covers: Deploying a Node.js application on Azure Kubernetes Service Creating a continous integration pipeline using orbs (reusable packages of YAML config) Automating ArgoCD to deploy the latest app version to the Kubernetes cluster GitOps modernizes software management and operations by allowing developers to declaratively manage infrastructure and code using a single source of truth, usually a Git repository. Many of these solutions support only push-based deployments. The Node. (BACK TO TOP)

http://ai.googleblog.com/

Posted by Kedem Snir, Software Engineer, and Gal Elidan, Senior Staff Research Scientist, Google Research Whether it's a professional honing their skills or a child learning to read, coaches and educators play a key role in assessing the learner's answer to a question in a given context and guiding them towards a goal. These interactions have unique characteristics that set them apart from other forms of dialogue, yet are not available when learners practice alone at home.g.g.g. (BACK TO TOP)

Posted by Rodrigo Benenson, Research Scientist, Google Research Open Images is a computer vision dataset covering ~9 million images with labels spanning thousands of object categories. Researchers around the world use Open Images to train and evaluate computer vision models. Since the initial release of Open Images in 2016, which included image-level labels covering 6k categories, we have provided multiple updates to enrich annotations and expand the potential use cases of the dataset.9M images. (BACK TO TOP)

Posted by Shaina Mehta, Program Manager, Google Google is proud to be a Platinum Sponsor of the European Conference on Computer Vision (ECCV 2022), a premier forum for the dissemination of research in computer vision and machine learning (ML). This year, ECCV 2022 will be held as a hybrid event, in person in Tel Aviv, Israel with virtual attendance as an option. We look forward to sharing some of our extensive research and expanding our partnership with the broader ML research community.P.   ↩ (BACK TO TOP)

https://packetpushers.net

Today on the Day Two Cloud podcast we're going to talk with someone who was part of a DevOps teams deploying Infrastructure as Code (IaC) and applications in the public cloud. This project ran into challenges around scaling, the environments they needed to support, how to store certain artifacts, working with pipeline, and breaking up a monolithic repo into smaller repos and the repercussions of that decision. (BACK TO TOP)

This week the Network Break covers new SASE capabilities from Fortinet, new 800G hardware from Cisco that uses its homegrown ASIC, and an app from RSA for smart phones that can disable authentication if the app detects malicious behavior. Plus we cover new initiatives from the Open Compute Project, disaggregated Wi-Fi, and more tech news. The post Network Break 404: Episode Not Found appeared first on Packet Pushers . (BACK TO TOP)

Today on the Tech Bytes podcast we talk about how to use out-of-band management for daily networking tasks, not just when there’s a problem or crisis. Our sponsor is Opengear and we’re joined by Ramtin Rampour, Solutions Architect, to talk about use cases including zero touch provisioning, configuration, and more. The post Tech Bytes: Using Opengear Every Day–For Disruptions And More (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

On today’s Heavy Networking episode, I talk with Nick Carter about Flock Networks, his routing protocol stack startup, as well as Nick’s love of the Rust programming language. As a network engineer, maybe you don’t think you care about Rust. Nick’s here to explain why the discerning network engineer might prefer their routing daemons to have been written in Rust. We also talk about the pleasures and travails of startup life. (BACK TO TOP)

https://pluralistic.net

Today's links Substituting economics for politics is a failure: The verdict is in on "economism." Hey look at this: Delights to delectate. This day in history: 2007, 2012, 2017, 2021. Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Substituting economics for politics is a failure (permalink) Most of us believe that we do stuff because we want to be good people, and that other people act the same. It's not that progressives ignored economists. (BACK TO TOP)

Today's links Uline's billions fund voter suppression: The Uihlein family used to fund the John Birch Society, today it's the Big Lie. Hey look at this: Delights to delectate. This day in history: 2002, 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Uline's billions fund voter suppression (permalink) Every billionaire is a policy failure, but every billionaire is also a factory for producing policy failures at scale. (BACK TO TOP)

Today's links An hour of interwar Halloween music: Spooky season listening from Centuries of Sound. Hey look at this: Delights to delectate. Interspersed with these "annual" mixes are some thematic ones. His latest, "Halloween Between the Wars," is an hour of spooky interwar music and radio/film horror excerpts: https://centuriesofsound." https://centuriesofsound.org/details/internet.archive.2022-10-19.hero.archive.org/web/20021004143604/https://blanu.net/curious_yellow.archive.blogspot.archive. (BACK TO TOP)

Today's links The Persuaders (how minds really change): No mind control required. Hey look at this: Delights to delectate. This day in history: 2007, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading The Persuaders (how minds really change) (permalink) I have always been interested in how people change their minds. My dad was and is an arguer, as am I. http://media.nypl.org/audio/2017_5_3_Edward_Snowden_AUDIO. His mind changed…a lot. (BACK TO TOP)

Today's links Backdooring a summarizerbot to shape opinion: Model spinning maintains accuracy metrics, but changes the point of view. Hey look at this: Delights to delectate. Such a tool is bound to become indispensable, and even if you know it might fail eventually, maintaining vigilance in the face of long stretches of reliability is impossible: https://techcrunch.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.theverge. https://pluralistic.org/pdf/2112.05224.g.g. (BACK TO TOP)

https://changelog.com/master

Mat Ryer gathers a gang of ghouls and ghosts to tell spooky developer stories! Join us to hear tales of Mat’s $1k nightmare, Dee’s infinite loop of horror, Natalie’s haunted time as a junior dev & many, many more. (BACK TO TOP)

In today’s episode, we talk about distroless, ko, apko, melange, musl and glibc. The context is Wolfi OS, a community Linux OS designed for the container and cloud-native era. If you are looking for the lightest possible container base image with 0 CVEs and both glibc and musl support, Wolfi OS & the related chainguard-images are worth checking out. Ariadne Conill is an Alpine Linux TSC member & Software Engineer at Chainguard. (BACK TO TOP)

This panel discussion was recorded at a recent event hosted by a company, Aryballe, that we previously featured on the podcast (#120). We got a chance to discuss the AI-driven technology transforming the order/fragrance industries, and we went down the rabbit hole discussing how this technology is being adopted at large, well-established companies. (BACK TO TOP)

Valerian Saliou’s Sonic search backend, Brandon Willett on how to build software like an SRE, DHH on why they’re leaving the cloud, Amos’ HTTP crash course nobody asked for & Sam Magura tells why he and the Spot team are breaking up with CSS-in-JS. (BACK TO TOP)

This week we’re talking with Will McGugan about using the terminal to not just build software, but also to deliver software. Will is a few months into his journey of building Textualize, a company he started around his open source projects Textual and Rich. When combined Textual and Rich give you a Python framework to build beautiful full-featured TUIs for the Terminal. (BACK TO TOP)

What do Story of the Week, HeadLIES & Pro Tip Time have in common? They’re all games we play on this seriously ridiculous episode of JS Party! (BACK TO TOP)

https://blog.cloudflare.com/

Privacy Gateway enables privacy-forward applications to use Cloudflare as a trusted Relay, limiting which identifying information, including IP addresses, is visible to their infrastructure (BACK TO TOP)

In this blog post, we describe a formal, computer-aided security analysis of Oblivious HTTP, an emerging IETF standard that applications can use to improve user privacy (BACK TO TOP)

Today, a change to our Tiered Cache system caused some requests to fail for users with status code 530 (BACK TO TOP)

Today Email Routing leaves Beta and an update on all the new things we've been adding to the service, including behind-the-scenes and not-so-visible improvements (BACK TO TOP)

You can now deploy SSR Next.js applications to the Cloudflare Pages platform ⚡️ (BACK TO TOP)

Starting today, Page Shield can now watch for malicious outbound connections made by third-party JavaScript code (BACK TO TOP)

https://stackoverflow.blog

Learn about the workflow designed to help users ask their first question on Stack Overflow. The post Introducing the Ask Wizard: Your guide to crafting high-quality questions appeared first on Stack Overflow Blog . (BACK TO TOP)

We’re fortunate to continue to grow at a rapid pace. In dynamic times, whether it be in times of hyper growth or in times of market volatility, we are seeing from our community and customers alike that breaking down the barriers to knowledge is essential for success. The post CEO update: Breaking down barriers to unlock innovation appeared first on Stack Overflow Blog . (BACK TO TOP)

We break down the key announcements - from Turbopack, to Splitbee analytics, to new features in Next.JS 13. The post Goodbye Webpack, hello Turbopack! The big news from today’s Next.JS conference appeared first on Stack Overflow Blog . (BACK TO TOP)

There's more to developer education than classrooms and bootcamps. The post A flight simulator for developers to practice real world challenges and surprises (Ep. 500) appeared first on Stack Overflow Blog . (BACK TO TOP)

Keystrokes per minute is a terrible measure of productivity, but a keyboard can help you focus better to be productive. The post How hardware and software can maximize your flow states appeared first on Stack Overflow Blog . (BACK TO TOP)

The service-oriented approach to 1MM rep, one qubit, and less scary cryptography The post The Overflow #148: How to job hop   appeared first on Stack Overflow Blog . (BACK TO TOP)

A long-time Microsoft employee explains his attraction to the new world of blockchain technologies. The post He helped build .NET and VS Code — Now’s he working on Web3 (Ep. 499) appeared first on Stack Overflow Blog . (BACK TO TOP)

https://www.microsoft.com/en-us/security/blog/

Products and solutions from Microsoft can help state, local, and territorial governments improve their cybersecurity and secure federal grant funding. The post Discover Microsoft Security solutions for SLTT government grant readiness appeared first on Microsoft Security Blog . (BACK TO TOP)

Microsoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread. The post Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity appeared first on Microsoft Security Blog . (BACK TO TOP)

Learn how Microsoft 365 Defender can enhance mitigations against lateral movement paths in your environment, stopping attackers from gaining access to privileged and sensitive accounts. The post How to prevent lateral movement attacks using Microsoft 365 Defender appeared first on Microsoft Security Blog . (BACK TO TOP)

Learn how Rabobank, Fannie Mae, and Ernst & Young maximized their existing Microsoft 365 subscriptions to gain integrated data loss prevention and information protection. The post How businesses are gaining integrated data protection with Microsoft Purview appeared first on Microsoft Security Blog . (BACK TO TOP)

In recent months, Microsoft has detected active ransomware and extortion campaigns impacting the global education sector, particularly in the US, by a threat actor we track as DEV-0832, also known as Vice Society. The post DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector appeared first on Microsoft Security Blog . (BACK TO TOP)

When it comes to cybersecurity, the ability to normalize and correlate disparate logs from different devices, appliances, and resources is key, as is the ability to react quickly when under attack. In this blog post, we explore the importance of EPP as an essential component in your security strategy. The post Secure your endpoints with Transparity and Microsoft appeared first on Microsoft Security Blog . (BACK TO TOP)

South Staffordshire PLC, a company that supplies water to over one million customers in the United Kingdom, notified its customers in August of being a target of a criminal cyberattack. This incident highlights the sophisticated threats that critical industries face today.  According to South Staffordshire, the breach did not appear to have caused damage to… The post Securing IoT devices against attacks that target critical infrastructure appeared first on Microsoft Security Blog . (BACK TO TOP)

https://www.amazon.science/

Examining the opportunities for creating a functional safety certification for autonomous mobile robots. (BACK TO TOP)

A model that estimates depth from 2-D images learns to adjust to differences between images produced by different cameras, reducing error by about 20%. (BACK TO TOP)

Examining how Amazon builds intelligent robots and the challenges inherent in training robots to manipulate packages at Amazon's scale. (BACK TO TOP)

Research topics range from visual anomaly detection to road network extraction, regression-constrained neural-architecture search to self-supervised learning for video representations. (BACK TO TOP)

Summit offered Day One fellows the opportunity to interact with leaders in the robotics field. (BACK TO TOP)

Company is testing a new class of robots that use artificial intelligence and computer vision to move freely throughout facilities. (BACK TO TOP)

Prioritizing predictability over efficiency, adapting data partitioning to traffic, and continuous verification are a few of the principles that help ensure stability, availability, and efficiency. (BACK TO TOP)

https://cloud.google.com/blog/

October 23rd (this past Sunday) was my 5th Googleversery and we just wrapped up an incredible Google Next 2022!  It was great to see so many customers and my colleagues in person this year in New York City. This blog is an attempt to share progress we have made since last year ( 4th year anniversary blog post 2021 Next ).  Bringing BigQuery to the heart of your Data Cloud Since last year we have made significant progress across the whole portfolio. You can read more details here . (BACK TO TOP)

Google Government Summit is right around the corner. Join us and government leaders for a full day of networking, best practices, and industry insights on November 15th in Washington, D.C. We can’t wait to see you live in 3D! Our event will offer over 30 various breakout sessions to engage and explore critical topics such as security and resilience, practical applications of artificial intelligence (AI), collaborative work, and building cultures of innovation and belonging. (BACK TO TOP)

The global workforce is facing a skills gap , affecting more than one billion jobs by 2030. As adoption of technology increases, the World Economic Forum estimates that  50% of all employees will need reskilling by 2025 . Globally, 69% of employers report  talent shortages and difficulty hiring  – mainly due to skills gaps. BlueCross BlueShield of Tennessee (BCBST) is facing these challenges, with more open cybersecurity and coding jobs than it can fill with local talent. (BACK TO TOP)

AI is at a tipping point. We are seeing the impact of AI across more and more industries and use cases. Organizations with varying levels of ML expertise are solving business-critical problems with AI — from creating compelling customer experiences, to optimizing operations, to automating routine tasks, these organizations learn to innovate faster and ultimately, get ahead in the marketplace. This widens the data to AI gap, limiting data-powered innovation. Step 3: Start running predictions .g. (BACK TO TOP)

Introduction Machine learning (ML) is essential to video game development. Predicting specific in-game actions and identifying and reaching your most valuable players helps to drive better outcomes. To this end, we need to keep track of all experiments that are happening behind the scenes.  In this blog post, we will focus on a popular video game dataset coming from the EA Sports' FIFA video game series. We will use this dataset to build a ML pipeline to predict the overall rating for a player.. (BACK TO TOP)

At Google Cloud, we continue to invest in our vision of invisible security where advanced capabilities are engineered into our platforms, operations are simplified, and stronger outcomes can be achieved. Assured Workloads is a Google Cloud service that helps customers create and maintain controlled environments that accelerate running more secure and compliant workloads, including enforcement of data residency, administrative and personnel controls, and managing encryption keys.S., U.K.S.S. (BACK TO TOP)

Google’s Data Cloud’s aim is to help customers close their data-to-value gap. BigQuery, Google Cloud Fully managed, serverless data platform lets customers  combine all data  — structured, semi-structured, and unstructured. Today, we are excited to announce the general availability of search indexes and search functions in BigQuery. This combination enables you to efficiently perform rich text analysis on data that may have been previously hard to explore due to the siloing of text information. (BACK TO TOP)

If organizations can easily analyze unstructured data streams, like live video and images, they can more effectively leverage information from the physical world to create intelligent  business applications. Retailers can improve shelf management by instantly spotting what products are out of stock, manufacturers can  reduce product defects by detecting production errors in real time, and in our communities, administrators could improve traffic management by analyzing vehicle patterns. (BACK TO TOP)

Blockchain is changing the way the world stores and moves its information. Building on our commitment to help Web3 developers build and deploy new products on blockchain-based platforms, today we’re thrilled to announce Google Cloud’s Blockchain Node Engine.  Blockchains consist of transaction data that is permanently stored and encrypted, acting as decentralized databases of sorts.g. geth), and waiting for the node to sync with the network. Syncing a full node from the first block (i.e. (BACK TO TOP)

Cloud customers of all sizes require a means to reduce unplanned downtime, scale, and increase productivity while extracting the optimal value from their cloud environments. According to a leading cloud analyst, a majority of today’s businesses operate multi-cloud environments, so essential support services must also be prepared to efficiently address complex cloud environments to meet each organization’s business imperatives for sustaining a competitive advantage.e.e.e.e.com (BACK TO TOP)

Deutsche Bank (DB) is the leading bank in Germany with strong European roots and a global network. DB was eager to reduce its workload for managing legacy infrastructure, so that their engineering community could instead focus on modernizing their financial service offerings. The bank’s desire for solutions that could dynamically scale to meet demand and reduced time to market for new applications was a key driver for migrating its infrastructure to the cloud. (BACK TO TOP)

Bulletin by Jakub Mikians