Skip to content

Latest commit

 

History

History
1784 lines (843 loc) · 96.8 KB

bulletin-2023-01-13.md

File metadata and controls

1784 lines (843 loc) · 96.8 KB

Bulletin for Friday, 13 Jan 2023

7 days digest


Stratechery by Ben Thompson (1)


The Hacker Factor Blog (1)


Metadata (1)


Think Fast, Talk Smart: Communication Techniques (1)


null program (1)


Microsoft Security Blog (1)


Weaveworks (1)


Sentry Blog RSS (1)


OpenAI (1)


Writing - rachelbythebay (1)


The Pragmatic Engineer (1)


Almost Secure (1)


The Teleport Blog (1)


Eugene Yan (1)


ongoing by Tim Bray (1)


The Technium (1)


Timescale Blog (1)


tech-at-instacart - Medium (1)


Computer Things (1)


Andrew Helwer (1)


James Bottomley's random Pages (1)


Project Zero (1)


Programming Digest (1)


Julia Evans (1)


Daniel Lemire's blog (1)


Stay SaaSy (2)


Earthly Blog (2)


Krebs on Security (2)


Replit Blog (2)


PlanetScale - Blog (2)


Simon Willison's Weblog: Blogmarks (2)


fasterthanli.me (3)


Towards Data Science - Medium (3)


The Full Feed - All of the Packet Pushers Podcasts (3)


Irrational Exuberance (3)


David Heinemeier Hansson (3)


Blog – Hackaday (4)


Go (Golang) Programming Blog - Ardan Labs on (4)


Amazon Science homepage (4)


Pluralistic: Daily links from Cory Doctorow (5)


Changelog Master Feed (6)


Stack Overflow Blog (6)


DTN (8)


The Cloudflare Blog (15)


Cloud Blog (20)


https://stratechery.com

Given the success of existing companies with new epochs, the most obvious place to start when thinking about the impact of AI is with the big five: Apple, Amazon, Facebook, Google, and Microsoft. (BACK TO TOP)

https://www.hackerfactor.com/blog/

I recently received requests from two different people who wanted help with their FotoForensics apps. It seems that their apps stopped working. I do not provide a "FotoForensics app". Over the last decade, I have identified over a half-dozen knock-off apps that claimed to be "FotoForensics". These fake apps fall into 3 basic categories: Malware . A few of the knock-offs install viruses on the user's device. If the application is not from the official vendor, then assume it is malicious. Ads .g. (BACK TO TOP)

http://muratbuffalo.blogspot.com/

Reconfiguration is a rich source of faults in distributed systems. If you don't reconfigure, you lose availability when you lose additional nodes. But the reconfiguration algorithms are subtle, and it is easy to get them wrong, and lose consistency during reconfiguration. This is because a reconfiguration operation is run concurrently with the read/write operations and with potentially other reconfiguration operations, and they run when the system is already in some turmoil due to faults.e. . .. (BACK TO TOP)

https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast

Do love and money mix? Labor economist and Stanford Graduate School of Business professor emerita Myra Strober says absolutely.  “Separating money and love is not a good idea. I have had 40 years to think about this, and, in my class at the GSB on work and family, each semester I realize how important it is to intertwine love and money. These may include caring for aging relatives, expanding your family, changing careers or moving.com/privacy and California Privacy Notice at https://art19. (BACK TO TOP)

https://nullprogram.com

This article was discussed on reddit . SDL has grown on me over the past year. I didn’t understand its value until viewing it in the right lens: as a complete platform and runtime replacing the host’s runtime, possibly including libc. Ideally an SDL application links exclusively against SDL and otherwise not directly against host libraries, though in practice it’s somewhat porous. SDL applications are always interesting one way or another, so I like to dig in when I come across them.)...exe app. (BACK TO TOP)

https://www.microsoft.com/en-us/security/blog/

​Organizations are looking for opportunities to do more with less. By adopting the latest identity innovations, you can better protect both your digital estate and your budget. The post ​​Microsoft Entra: 5 identity priorities for 2023 appeared first on Microsoft Security Blog . (BACK TO TOP)

https://www.weave.works/

There are many different terms used in the world of cloud-native software delivery – and the lexicon seems to be growing all the time. From continuous integration to continuous delivery and continuous deployment, they can certainly be confusing to novices – and in some cases, to experts too. In this article, we go back to basics and explain what is commonly meant by some of the most frequently used terms. Continuous integration (CI) was developed in answer to these pressures. (BACK TO TOP)

https://blog.sentry.io

Let’s start by stating the obvious: an exception is a problem that occurs during the runtime of a program which disrupts its conventional… (BACK TO TOP)

https://openai.com/

OpenAI researchers collaborated with Georgetown University’s Center for Security and Emerging Technology and the Stanford Internet Observatory to investigate how large language models might be misused for disinformation purposes. The collaboration included an October 2021 workshop bringing together 30 disinformation researchers, machine learning experts, and policy analysts, and (BACK TO TOP)

https://rachelbythebay.com/w/

I was doing some light nerd reading at lunch the other day and ran across someone who had encountered trouble with a program that was using TCP_NODELAY when perhaps it shouldn't. TCP_NODELAY is one of those things which turns off Nagle's algorithm, which is usually used to batch up a bunch of small writes so you don't spam the network with tons of tiny packets. (If this sounds familiar to long-time readers, it's because it starred in a post that made the rounds in the fall of 2020. Seriously. .. (BACK TO TOP)

https://blog.pragmaticengineer.com/

What was the compensation philosophy of the events tech startup, and how much were devs, EMs and PMs paid? (BACK TO TOP)

https://palant.info/

I wrote about South Korea’s mandatory so-called security applications a week ago. My journey here started with TouchEn nxKey by RaonSecure which got my attention because the corresponding browser extension has more than 10 million users – the highest number Chrome Web Store will display. The real number of users is likely considerably higher, the software being installed on pretty much any computer in South Korea. People call it “malware” and a “keylogger. And the bank complies.g. response .0.0. (BACK TO TOP)

https://goteleport.com/blog/

A short overview of Passkeys, and how to use them to secure your infrastructure with Teleport. (BACK TO TOP)

https://eugeneyan.com

Seeking first to understand, earning trust, and preparing for away team work. (BACK TO TOP)

https://www.tbray.org/ongoing/ongoing.atom

(BACK TO TOP)

https://kk.org/thetechnium

A generation ago a very popular book among progressives was E.F. Schumacher’s Small Is Beautiful. The 1973 book eloquently argued for “small”, that is, human scale things, and railed against big institutions, big systems, big solutions. This small book was … Continue reading → (BACK TO TOP)

https://www.timescale.com/blog/

From security to data encryption improvements, Chris Travers shares his PostgreSQL developer perspective on six of the latest commitfest patches. (BACK TO TOP)

https://tech.instacart.com

Our Data Science team at Instacart is responsible for all data analytics, insights and experimentation at the company. The team partners with our Product and Engineering teams on all stages of the product life cycle, from ideation and prioritization, to execution, iteration and optimizations on all our product lines. We caught up with a few of our data scientists to learn more about their Data Science journey and what brought them to Instacart. Briefly describe your team and role.g. (BACK TO TOP)

https://buttondown.email/hillelwayne

Computer Things: 2021 Edition It’s over a year late, I know, but the 2021 Newsletter collection is now available to purchase as a PDF . 70,000 words, 250 pages, 20 bucks. Unlike last year, there’s no private subscriber-only emails, so this is purely for people who want to read it on the go / give me money. I might add a postmortem review or an introduction piece if there’s enough interest. But I think it’s important to give things a fair shake, even if I don’t like them. 1. 2. (BACK TO TOP)

https://ahelwer.ca/

2021 saw the completion of my first substantial free software project: a TLA⁺ grammar for tree-sitter, the error-tolerant incremental parser generator. The project stabilized & found users over the course of 2022, then over the holidays I used it to build the TLA⁺ Unicode Converter. The new year is a time to reflect on the past and look to the future, so here in early 2023 seems ideal to publish my experience. (BACK TO TOP)

https://blog.hansenpartnership.com

If you read more than a few articles in my blog you’ve probably figured out that I’m pretty much a public cloud Luddite: I run my own cloud (including my own email server) and don’t really have much of my data in any public cloud. I still have public cloud logins: everyone wants to share […] (BACK TO TOP)

https://googleprojectzero.blogspot.com/

@import url('https://themes.googleusercontent.com/fonts/css?kit=pYEwJuzr3ZMDX2Y1syVbvx06if6osnyAslCuLPPf50A');ul.lst-kix_h97ui6n3g8c8-4{list-style-type:none}ul.lst-kix_h97ui6n3g8c8-5{list-style-type:none}ul.lst-kix_h97ui6n3g8c8-2{list-style-type:none}ul.lst-kix_h97ui6n3g8c8-3{list-style-type:none}ul.lst-kix_h97ui6n3g8c8-8{list-style-type:none}ul.lst-kix_h97ui6n3g8c8-6{list-style-type:none}.lst-kix_o4b5kflpgafe-7>li:before{content:"- "}ul.lst-kix_h97ui6n3g8c8-7{list-style-type:none}ul.7.6.2.g.g. (BACK TO TOP)

https://programmingdigest.net

#504 – January 09, 2023 Happy 2023! 🍾 I hope you had a great break and we'll jump straight to the amazing articles that popped up over the break. 8 Hard Truths I learned when I got laid off from my SWE job Getting laid off is a profoundly lonely experience. You will face platitudes weaker than the industrial toilet paper your startup switched to as they tried to rein in costs. That is my goal for this piece. Atomic operations don't make your code wait-free, lock-free, or even obstruction-free. (BACK TO TOP)

http://jvns.ca/atom.xml

Hello! I like looking at other independent authors’ business graphs, so I thought I’d share some percentages and graphs of my own this year. Hopefully some of this is useful to other writers who run internet businesses. All of the graphs are about Wizard Zines ’ business selling zines – I don’t do sponsorships or consulting or commissions or anything. print vs digital sales This year 58% of sales were digital and 42% were print. So I keep an eye on the percentage of corporate sales.).62% UK: 5. (BACK TO TOP)

https://lemire.me/blog

We often have to represent in software a value that might be missing. Different programming languages have abstraction for this purpose. A recent version of C++ (C++17) introduces std::optional templates. It is kind of neat. You can write code that prints a string, or a warning if no string is available as follows: void f(std::optional<std::string> … Continue reading Care is needed to use C++ std::optional with non-trivial objects (BACK TO TOP)

https://staysaasy.com/

Teams naturally start to incur management debt as they grow and become more complex, just as codebases incur tech debt. The combined weight of past decisions creates a web of precedents and exceptions that can cause problems of varying size over time. For a concrete example of management debt, consider a team that’s never had performance reviews. They’ve saved time by skipping reviews, but have taken on significant management debt by not setting expectations or addressing over/under performance. (BACK TO TOP)

Many have viewed the last 10 years of tech as having been increasingly employee-advantaged. Jobs were plentiful and talent was scarce, and this led to all sorts of interesting behavior. Some of this behavior was good and appropriate. As the talent market heated up: Employers paid more and recruited harder. They also made job requirements more flexible, allowing for people with non-traditional backgrounds to have more opportunities. I.e. People working multiple remote jobs at once.g.g. (BACK TO TOP)

https://earthly.dev/blog/

Ninja is a compact build system with a focus on fast incremental builds. It was originally developed by Evan Martin , a Google dev, partly in response to the needs of building large projects such as Google Chrome. If you’re developing a software system and you require a rebuild every few minutes to test your latest feature or code block, then Ninja will only rebuild what you have just modified or added and nothing else—as opposed to Make , which would rebuild the whole project every single time. (BACK TO TOP)

When it comes to security in Kubernetes, it is vital to secure the individual resources of the cluster. Pods and containers are considered the core resources running in the cluster and are the fundamental building block of Kubernetes workloads. Applying security to the pod and container layer can have a huge impact on the overall security of your cluster. By default, Kubernetes pods have root access. Specifying if permissions can be escalated or not. Applying security contexts on pod level.spec. (BACK TO TOP)

https://krebsonsecurity.com

Microsoft today released updates to fix nearly 100 security flaws in its Windows operating systems and other software. Highlights from the first Patch Tuesday of 2023 include a zero-day vulnerability in Windows, printer software flaws reported by the U.S. National Security Agency, and a critical Microsoft SharePoint Server bug that allows a remote, unauthenticated attacker to make an anonymous connection. (BACK TO TOP)

Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking a copy of their credit report successfully answer several multiple choice questions about their financial history. But until the end of 2022, Experian's website allowed anyone to bypass these questions and go straight to the consumer's report. (BACK TO TOP)

https://blog.replit.com/

We’re extremely excited to announce Replit’s very first Machine Learning Hackathon, in partnership with Weights and Biases! If you’re interested in joining the waitlist, head over to the official site. Sign up for the WaitlistWeights and Biases is a machine learning platform that tracks everything you need to make your models reproducible – from hyperparameters and code to model weights and dataset versions. You’ll need a Replit account, as well as a Weights & Biases account, to participate. (BACK TO TOP)

In August last year, we announced Repl Identity, a signed identity for every Repl that your code can use to authenticate other Repls when communicating with your APIs and services. For a quick refresher, you can try out the demo that decodes the identity token and outputs it to the shell. We have a Go package for this already (docs here), but there's a limited selection of bindings for other languages. Enjoy! (BACK TO TOP)

https://planetscale.com

A quick glimpse on Support at PlanetScale and the issues we see the most often. Read the full story (BACK TO TOP)

Learn how to solve your Rails applications N+1’s caused by exists? queries. Read the full story (BACK TO TOP)

http://simonwillison.net/

(BACK TO TOP)

(BACK TO TOP)

https://fasterthanli.me/index.xml

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

https://towardsdatascience.com

A closer look at the technicalities and practical applications Introduction In this article we will cover the topic of character encoding standards, specifically focusing on the ASCII and Unicode systems. We will dive into how they work and their role in deep learning. In addition, we will provide some examples of character encoding using Tensorflow, to have an overview of how this library manages strings on the inside. It is widely used, but it has some limitations.g.g., U+00F7). tf.strings. (BACK TO TOP)

This field isn’t perfect so it’s best to set expectations properly Continue reading on Towards Data Science » (BACK TO TOP)

How to create a local dbt project with dummy data for testing purposes with Docker Continue reading on Towards Data Science » (BACK TO TOP)

https://packetpushers.net

The IPv6 Buzz podcast talks with Richard Hicks about Microsoft's OS changes and use cases for IPv6. Richard is a technology consultant and author. We discuss which Microsoft solutions use IPv6, what its v6 strategy changed, and more. The post IPv6 Buzz 117: Microsoft’s OS Evolution With IPv6 appeared first on Packet Pushers . (BACK TO TOP)

IT security is broken. Vendors ship insecure products, customers have to bolt on and then operate more and more security products, compliance and regulatory requirements don't necessarily make things safer, and getting business done always takes priority over securing systems and data. On today's Day Two Cloud podcast, guest Mick Douglas shares ideas on how to make security less excruciating and more effective. (BACK TO TOP)

Take a Network Break! For our first show of 2023 we skip the news to spend some time speculating on technologies and trends that may influence IT and networking in the coming year, including the influence of AI, machine learning, and ChatGPT in tech; data center network automation; cloud repatriation; and more. The post Network Break 412: IT Spending, ChatGPT, Cloud Repatriation And Other 2023 IT Speculations appeared first on Packet Pushers . (BACK TO TOP)

https://lethain.com/

I’ve been wanting to spend some time trying out recent developer and infrastructure tooling, starting with taking Tailscale for a spin (it’s quite nice). Next, I’ve been thinking about replacing Google Analytics on this blog for some time, and decided to try out Plausible.io as a replacement. For the record, I don’t have any profound gripes with Google Analytics, rather I’d say that I’m profoundly grateful to GA.g. SOC2) and SSO. (Their Data Processing Agreemenet is an interesting read.Site. (BACK TO TOP)

I started my first executive job search when I was 25. Eventually, I got an offer to lead engineering at a startup with four engineers, which I turned down to join Uber. It wasn’t until a decade later that I joined Calm and started my first executive role. If you start researching executive career paths, you’ll find folks who nominally become engineering executives at 21 when they found a company, and others that are 30+ years into their career without taking an engineering executive role.g.g. (BACK TO TOP)

tl;dr - it’s valuable to update your LinkedIn profile to be a concise, accurate, and current summary of your accomplishment. Spend at most two hours updating it, then ask a friend (ideally a recruiter) for feedback. Incorporate that feedback and don’t think about your profile again for at least a year. While writing my notes on landing an engineering executive role , a topic that came up in feedback a number of times was how valuable it is to have a reasonably good LinkedIn profile.g.linkedin.g. (BACK TO TOP)

https://world.hey.com/dhh

I started my career in programming during heydays of Java Enterprise Edition (J2EE). This was late 90s/early 00s, and there was a rich ecosystem of enterprise vendors hawking application servers, monitoring tools, and boxes upon boxes of other fancy solutions. These tools were difficult to learn, expensive to license, and required an army of contractors, consultants, and sales people to purchase, configure, and run. But that the ratio between Good Idea and Bullshit was completely out of whack. (BACK TO TOP)

We spent the last couple of months thinking that bringing HEY home from the cloud was going to involve SUSE Rancher and Harvester. A combination of enterprisey software products that would give us a cloud-like experience on our own hardware, and require minimal changes to how HEY is already packaged and deployed. We spend about three million dollars per year on renting hardware and services in the cloud. Now at first, we actually thought this wasn't going to be an issue. Three percent... (BACK TO TOP)

Carlos Trujillo recently had to cancel a Basecamp account, but we managed to leave a warm, lasting impression by making it effortless. No last-minute offers, no pressure to get on a call to "explain", no dark patterns of any kind. Just gratitude that we could be of service while it lasted. It seems self-evident that it should always be like this with subscription services, but disappointingly often that's not the case. But it's ultimately the wrong way to look at it.1% of those subjected. (BACK TO TOP)

https://hackaday.com

A listener of the podcast recently wrote in to tell us that, in the process of trying to purchase a legitimate Hackaday t-shirt, they discovered this 2012 Instructable from [yeltrow] …read more (BACK TO TOP)

Whether it’s your favorite programming language, or your favorite beverage, there’s no denying Java is everywhere. Now, it’s even on the Nintendo 64, thanks to the valiant efforts of [Mike …read more (BACK TO TOP)

As a community we owe perhaps more than we realise to the RepRap project. From it we get not only a set of open-source printer designs, but that 3D printing …read more (BACK TO TOP)

Sometimes, the best gift is the one you make yourself. [Pigeonaut] decided to whip up a few Game Boy games of their very own creation to gift to the special …read more (BACK TO TOP)

https://www.ardanlabs.com/blog/

Introduction In episode 14, Bill architected a solution to digitally sign the transactions on his blockchain. His solution retrieved the private key by : loading private key data from disk, parsing the key data and returning the ECDSA private key. The private key is then used to generate the signature of a transaction. While writing the code to perform this functionality, Bill highlighted how a blockchain node can use a transaction’s signature to extrapolate the public key. (BACK TO TOP)

Introduction Google developed Go to be an alternative to C++ with the internet and scale in mind. Go’s toolchain automates tasks that are easily overlooked, and amongst those tasks is generating documentation. Go has the ability to generate documentation based on comments written in your source code. As the end user, you have the choice to view this documentation in your terminal or, if your code is publicly accessible, on pkg. (BACK TO TOP)

Introduction In episode 12, Bill laid out his strategy to handle data hashing on his blockchain. The first step he took was to create a package to handle the cryptographical aspects of his blockchain. After that, he wrote a hash function that met the requirements outlined in his strategy. This function took transaction data as a parameter and returned a hexadecimal representation of the hash. To implement this function, Bill imported packages from the Go standard library and Ethereum API. (BACK TO TOP)

Introduction In episode 13, Bill discussed the idea of adding salt to a hash and how modern crypto-currency blockchains use it to better interpret requests sent to nodes. He continued by defining a function called stamp that embeds a salt within a hash. While writing the function, Bill stated that he would use keccak256 as it’s the same algorithm used by Ethereum to generate hash values. Bill will use the APIs provided with Go Ethereum to generate a keccak256 hash. (BACK TO TOP)

https://www.amazon.science/

The collaboration, housed in the College of Engineering, includes funds for faculty research projects, with an initial focus on AI, robotics, and operations research. (BACK TO TOP)

Private aggregation of teacher ensembles (PATE) leads to word error rate reductions of more than 26% relative to standard differential-privacy techniques. (BACK TO TOP)

Mehrdad Mahdjoubi, founder and CEO of Alexa Fund portfolio company, explains ‘no compromise’ approach to saving resources without sacrificing user experience. (BACK TO TOP)

Quantization with self-adjustable centroids, contrastive predictive coding for transfer learning, teacher ensembles for differential privacy, and more — Amazon’s speech research features a battery of cutting-edge machine learning techniques. (BACK TO TOP)

https://pluralistic.net

Today's links Good riddance to the Open Gaming License: Hasbro accidentally gives us more freedom. John Deere's repair fake-out: So many strings attached. Hey look at this: Delights to delectate. Gamers were right to be worried. Giant companies love to rugpull their fans, tempting them into a commons with lofty promises of a system that we will all have a stake in, using the fans for unpaid creative labor, then enclosing the fans' work and selling it back to them.wikipedia.) https://musicbrainz. (BACK TO TOP)

Today's links Deena Mohamed's 'Shubiek Lubiek': An English edition of a brilliant Egyptian alt history comic about a world where wishes are real. Hey look at this: Delights to delectate.penguinrandomhouse.com/books/606934/shubeik-lubeik-by-deena-mohamed/ The world of Shubeik Lubeik is an intricate alternate history in which wishes are real, and must be refined from a kind of raw wish-stuff that has to be dug out of the earth.tor. Despite knock-down prices, no one wants to buy Shokry's wishes.ac. (BACK TO TOP)

Today's links The learned helplessness of Pete Buttigieg: Section 41712(a) or bust. Hey look at this: Delights to delectate. This day in history: 2003, 2008, 2013, 2022 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading The learned helplessness of Pete Buttigieg (permalink) The apocalyptic airline meltdown over the Christmas break stranded thousands of Americans, ruining their vacations and costing them a fortune in unexpected fees.bloomberg.ac. (BACK TO TOP)

Today's links Social Quitting: How social media barons squandered their lock-in and made themselves obsolete. Hey look at this: Delights to delectate.com/2023/01/commentary-cory-doctorow-social-quitting/ The core of the argument revolves around surpluses – that is, the value that exists in the service. For a user, surpluses are things like "being able to converse with your friends" and "being able to plan activities with your friends." Platforms control most of the surplus-allocating options.dw. (BACK TO TOP)

Today's links Naomi Novik's incredible, brilliant, stupendous "Temeraire" series: The Napoleonic Wars, but with dragons! Hey look at this: Delights to delectate. I just had this experience and I am still basking in the warm glow of having had such a thoroughly fulfilling imaginary demi-life for half a year. I'm speaking of the nine volumes in Naomi Novik's Temeraire series, which reimagines the NapoleonicWars in a world that humans share with enormous, powerful, intelligent dragons. https://www. (BACK TO TOP)

https://changelog.com/master

Paul Smith (from “Obama’s Trauma Team”) tells us the tale of how Go played a big role in the rescuing and rebuilding of the HealthCare.gov website. Along the way we learn what the original team did wrong, how the rescue team kept it afloat during huge traffic spikes, and what they’ve done since to rebuild it to serve the people’s needs. (BACK TO TOP)

Marcos Nils has been into platform engineering for the best part of the last decade. He helped architect & build developer platforms using VMs & OpenStack, containers with Docker, and even Kubernetes. He did this at startups with 10 people, as well as large, publicly traded companies with 1000+ software engineers. Today we talk with Marcos about the hard parts of platform engineering. (BACK TO TOP)

Daniel and Chris do a deep dive into OpenAI’s ChatGPT, which is the first LLM to enjoy direct mass adoption by folks outside the AI world. They discuss how it works, its effect on the world, ramifications of its adoption, and what we may expect in the future as these types of models continue to evolve. (BACK TO TOP)

Brandur Leach’s easy, alternative soft deletion strategy, Lane Wagner’s zen of proverbs, Nicolas Carlo says fake it until you can automate it, Felix A. Crux thinks feeds are the only civilized way to read online & Ben Thompson analyzes AI and the big five tech companies. (BACK TO TOP)

Welcome to 2023 — we’re kicking off the year talking to Justin Searls about the state of web development and why he just might write a “You Might Not Need React” post. He’s been so productive using Turbo and Stimulus (and tailwind) in Rails 7 that we had to talk about the state of Rails development today and a bunch of other fun topics around building for the web in 2023. (BACK TO TOP)

It’s our 4th annual New Year’s party! Jerod & the gang review our (failed) resolutions from last year, discuss what’s trending in the web world, make a few predictions of our own & even set some new (probably failed) resolutions for this year. (BACK TO TOP)

https://stackoverflow.blog/

Let’s start the year on a high note! We’re excited to announce our 14th Stack Gives Back. The post Stack Gives Back 2022! appeared first on Stack Overflow Blog . (BACK TO TOP)

We chat about how their design system is evolving into a platform, how AI keeps their brand consistent, and why a design system doesn’t have to solve every use case.  The post Taming multiple design systems with a single plugin (Ep. 526) appeared first on Stack Overflow Blog . (BACK TO TOP)

The best way to know why your users were rage clicking? Check the instant replay. The post From CS side project to the C-suite (Ep. 525) appeared first on Stack Overflow Blog . (BACK TO TOP)

Our developer survey found 93% of developers use Git. But what are the other 7% using? The post Beyond Git: The other version control systems developers use appeared first on Stack Overflow Blog . (BACK TO TOP)

Reading academic papers, hidden spam links, and language in the brain The post The Overflow #159: Our top blog posts (part 2)   appeared first on Stack Overflow Blog . (BACK TO TOP)

From BeReal to RetroPi, we look back at what brought us joy last year. The post Our favorite apps, books, and games of 2023 (Ep. 524) appeared first on Stack Overflow Blog . (BACK TO TOP)

https://www.dtn.com/

All the recession warning lights are blinking a bright red, but consumers are spending, and hiring remains strong. According to Brian Milne, data from past recessions and recoveries may not apply in this new world. See what he thinks lies ahead. The post Recession and Gasoline Demand in the Modern World appeared first on DTN . (BACK TO TOP)

As we put last year's challenges behind us, explore the three trends we expect to see in the shipping industry in 2023 — and learn how data and technology can help you make the most of them. The post Three shipping industry trends to watch for in 2023 appeared first on DTN . (BACK TO TOP)

When selling to farmers, highlighting value is both essential and individual. Read how clear personas using detailed data drive better results. The post Three Things to Know Before Your Next Farm Sales Meeting appeared first on DTN . (BACK TO TOP)

Extreme weather events are increasing, and utilities and customers alike are feeling the impact. Learn why AI is a smart - and necessary – investment. The post Extreme Weather Showcases Value Of Machine Learning appeared first on DTN . (BACK TO TOP)

Winter road maintenance is challenging — especially this season. See how innovative technology helps organizations ensure safer travel while controlling costs around critical resources. The post Strengthening Winter Road Maintenance Programs to Tackle Record Conditions appeared first on DTN . (BACK TO TOP)

We've all felt the pinch of supply chain issues in recent years. See how DTN is helping reduce disruptions with vital innovations and unique insights focused on key parts of this essential global network. The post Innovation That Delivers Actionable Insights for Global Supply Chains appeared first on DTN . (BACK TO TOP)

DTN® has announced a new, first-to-market WeatherFactor API to help freight traders improve pre-voyage planning and better anticipate voyage duration risks by blending multiple data sets to make a variety of voyage simulations possible, increasing cargo bid accuracy and more reliable cost margin expectations. The post DTN Launches First-to-Market WeatherFactor API for Shipping appeared first on DTN . (BACK TO TOP)

As climate challenges drive the need for more timely and specific information, DTN is advancing technology in support of weather-sensitive industries worldwide. See how it pushes the envelope to deliver precise insights for proactive and in-the-moment decisions. The post High Performance Weather Computing in the Cloud appeared first on DTN . (BACK TO TOP)

https://blog.cloudflare.com/

Cloudflare Access & Gateway now support the System for Cross-domain Identity Management (SCIM) protocol. (BACK TO TOP)

As CIOs navigate the complexities of stitching together multiple solutions, we are extending our collaboration with Microsoft to create one of the best Zero Trust solutions available. (BACK TO TOP)

Customers can now onboard O365 domains to Area 1, adding more flexibility on deployment methods. (BACK TO TOP)

Cloudflare CASB adds two new SaaS integrations for Salesforce and Box. (BACK TO TOP)

Safely configure and deploy updates to zone configuration with Zone Versioning now Generally Available for Enterprise customers (BACK TO TOP)

Email Link Isolation is your safety net for the odd links that end up in people’s inboxes, and they may click. This added protection turns Cloudflare Area 1 into the most comprehensive email security solution when it comes to protecting against phishing attacks. (BACK TO TOP)

Customers can leverage the power of Email Security and Cloudflare One to prevent data loss in their corporate network. (BACK TO TOP)

Cloudflare CASB and DLP will work together to protect sensitive data at rest. (BACK TO TOP)

Making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account. (BACK TO TOP)

Protect sensitive data on any Access app for any user on any device. (BACK TO TOP)

This week we’re announcing the Authorized Services Delivery Partner Track (ASDP) designed to validate partners that want to deliver services around Cloudflare One (BACK TO TOP)

Cloudflare is making it even easier to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic. (BACK TO TOP)

Investigate, allow or block decisions based on how a connection was made with the same level of ease that you can troubleshoot user identity. (BACK TO TOP)

Cloudflare WARP can now securely detect pre-configured locations and route traffic based on the needs of the organization for that location. (BACK TO TOP)

Today, over 10,000 organizations trust Cloudflare One to connect and secure their users, devices, applications, and data. As part of CIO Week, we spoke with the leaders of some of our largest customers to better understand why they selected Cloudflare (BACK TO TOP)

https://cloud.google.com/blog/

We meet daily with contact center owners and customer experience (CX) execs across all industries, geographies, and business sizes. Looking back at these conversations, it’s crystal clear that 2022 was a high-stakes year for call centers, with three primary challenges trending across all customers and continuing in 2023: Many organizations feel pressure to rapidly scale up their call center operations in response to macroeconomic changes . 2. That requires modern Cloud and AI solutions. .   3. (BACK TO TOP)

Understanding protein geometries is essential to understanding a protein’s function, and thus essential to a range of disruptive research projects, from creating more sustainable materials to developing more effective treatments to diseases. For this reason, the “protein-folding problem” ranked for decades among biological science’s grand challenges—until Google’s DeepMind developed AlphaFold . However, to run AlphaFold, you will need to download over 2. Enables Vertex AI APIs. 2. 3. 5.py .py . (BACK TO TOP)

The pandemic transformed how consumers and the retail ecosystem interact and do business with one another. From exclusive online shopping and curbside pick up to the return of footfall in physical stores—engagement, operations, and expectations have changed. Consumers want seamless shopping experiences, regardless of where their shopping begins and ends. This is why retailers, manufacturers, and distributors are turning to Kibo Commerce. After evaluating many BI solutions, we chose Looker. (BACK TO TOP)

Incorrect or incomplete addresses can cause delays, incur high costs to retailers, and lead to poor delivery experiences across the retail journey. In fact, a single failed delivery costs on average $17.20 in the US and £11.6 in the UK 1 .  And with 5% of all last mile deliveries failing, it’s no surprise that retailers and their courier partners are looking to improve customer experiences by reducing address errors upfront.g., shipping address or billing address). 2. 1. Addresses with typo... (BACK TO TOP)

Editor’s note : To kick off the new year and in preparation for NRF The Big Show, we invited partners from across our retail ecosystem to share stories, best practices, and tips and tricks on how they are helping retailers transform during a time that continues to see tremendous change. Please enjoy this entry from our partner. Every brand aspires to unrivaled growth powered by passionate customers and dependable data. That’s a lot of valuable information falling through the cracks. (BACK TO TOP)

Before co-founding Masthead Data , the question I heard constantly in my previous roles was, ‘can we trust the data?’ It’s not surprising that people have doubts. Even a minor data error can result in wasted resources, missed opportunities, and lost revenues.  While data observability solutions do exist, many are expensive and difficult to scale, especially if you need to check every table in your database. Many organizations routinely manage several petabytes of data.S. (BACK TO TOP)

Safeguarding your data needs a sure-fire game plan and Google Cloud continues to constantly update our products and services to help you achieve that. In the third installment of this series, let’s explore a few key launches from Google Cloud Security during the second half of 2022. Google Cloud’s IAM Allow policy lets you grant granular access to Google Cloud resources. IAM Deny policies always supersede IAM Allow policies and override conflicting IAM Allow rules. Read Article (BACK TO TOP)

Google Cloud is a partner-first company, and in 2022 our ecosystem of partners delivered incredible innovation and value to customers, like migrating entire data centers to the cloud, modernizing businesses’ data strategies, solving industry-specific challenges, and more. As we kick off a new year, the opportunity for our partners to drive digital transformation will be greater than ever.  That’s why we believe you cannot be customer-centric if you are not also partner-centric.S. public sector. (BACK TO TOP)

Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more.  Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here:  Google Cloud blog 101: Full list of topics, links, and resources . Week of Jan 9 - Jan 13, 2023 Comprehensive guide for designing reliable infrastructure for your workloads in Google Cloud . Kubernetes v1. (BACK TO TOP)

As a Google Cloud practitioner, you typically spend a lot of time in the documentation pages to read up on the guides, commands, tutorials and more. The documentation team has introduced several features over the years to make it easier to be more productive while working with Google Cloud documentation. A few of these tips would be well known to some of you and I am hoping that there is at least one tip that you go away with that helps you.g. Compute Engine VM names).  For e.g.g.  (BACK TO TOP)

Retail organizations constantly face financial pressure to increase sales while maintaining profit margins. Digital commerce creates new opportunities and a more competitive landscape for retailers by allowing them to reach a global customer base online, but it also exposes them to competition from larger online retailers. Managing and scaling this infrastructure can be challenging, especially as needs evolve.” — Hesham Fahmy, VP Technology, Loblaw L.L.6 billion. Like many other retailers, L.L. (BACK TO TOP)

Do you worry about the reliability of your workloads in the cloud? Does the thought of application downtime give you sleepless nights? At Google, we also think about reliability a lot — and take steps to ensure your workloads are running on a reliable foundation: We’ve designed Google Cloud to tolerate infrastructure failures and recover quickly from them, and we continually invest and innovate to prevent outages and to improve the resilience of the Google Cloud infrastructure. (BACK TO TOP)

Editor’s note : To kick off the new year and in preparation for NRF The Big Show, we invited partners from across our retail ecosystem to share stories, best practices, and tips and tricks on how they are helping retailers transform during a time that continues to see tremendous change. Please enjoy this entry from our partner. The dramatic transformation of the retail industry has created a host of new security challenges. Read Article (BACK TO TOP)

Dataproc is a fully managed service for hosting open-source distributed processing platforms such as Apache Hive, Apache Spark , Presto , Apache Flink , and Apache Hadoop on Google Cloud. Dataproc provides flexibility to provision and configure clusters of varying sizes on demand. In addition, Dataproc has powerful features to enable your organization to lower costs, increase performance and streamline operational management of workloads running on the cloud.004 - $0.04 - $0.g.wagtailcore.  2.g. (BACK TO TOP)

Before you can train ML models in the cloud, you need to get your data to the cloud.  But when it comes to storing data on Google Cloud there are a lot of different options. Not to mention the different ways you can read in data when designing input pipelines for custom models. Whether your use case requires structured or unstructured data, these tips will help you to build more efficient input pipelines with Vertex AI. This happens automatically without any extra work on your part.keras.utils.. (BACK TO TOP)

It is an exciting time at Google Cloud as we integrate Mandiant’s intelligence and expertise into our enterprise offerings . Today, I am pleased to announce a new offering, Threat Ready with Mandiant. This new solution can help enterprises protect what matters most to their business, and can help them access Mandiant expertise. Threat Ready with Mandiant is available for Google Cloud customers and for customers running on-prem and multi-cloud environments.mandiant.com . (BACK TO TOP)

Editor's note: Berlin-based startup Opinary migrated their machine learning pipeline from Google Kubernetes Engine (GKE) to Cloud Run. After making a few architectural changes, their pipeline is now faster and more cost-efficient. They reduced the time to generate a recommendation from 20 seconds to a second, and realized a remarkable 50% cost reduction. In this post, Doreen Sacker and Héctor Otero Mediero share with us a detailed and transparent technical report of the migration. Read Article (BACK TO TOP)

Editor’s note : To kick off the new year and in preparation for NRF The Big Show, we invited partners from across our retail ecosystem to share stories, best practices, and tips and tricks on how they are helping retailers transform during a time that continues to see tremendous change. Please enjoy this entry from our partner. If you put a pot of water on the stove, it doesn’t heat up instantly. It simmers slowly at first, eventually picking up steam to reach a rolling boil. And they’re right.. (BACK TO TOP)

Responding to changes in cloud resources with Eventarc and Cloud Run In this post we explore how to use Eventarc to asynchronously react to cloud events that signal changes in cloud infrastructure. We also walk through an implementation of a basic Cloud Run service that can react to such an event and perform downstream operations. In this example we use audit logging events for Apigee to trigger events in Eventarc. This is where Eventarc comes into the picture.js service.json and index.0.0.17.1. (BACK TO TOP)

Introduction Most machine learning models require the input features to be in numerical format and if the features are in categorial format, pre-processing steps such as one-hot encoding are needed to convert them into numerical format. Converting a large number of categorical values may lead to creating sparse features, a set of features that contains mostly zero or empty values. We are happy to announce a new functionality that supports sparse features in BigQuery .wagtailcore.rich_text. (BACK TO TOP)

Bulletin by Jakub Mikians