Skip to content

Latest commit

 

History

History
1746 lines (831 loc) · 100 KB

bulletin-2022-07-29.md

File metadata and controls

1746 lines (831 loc) · 100 KB

Bulletin for Friday, 29 Jul 2022

7 days digest


General Engineering Archives - Uber Engineering Blog (1)


Schibsted engineering - Medium (1)


Notes on software development (1)


The Evolution of Cybernetics (1)


Blog on Tailscale (1)


Posts on (1)


Timescale Blog (1)


Computer Things (1)


dropbox.tech (1)


Monzo - Technology (1)


frankdenneman.nl (1)


Julia Evans (1)


LogicAI website (1)


Metadata (1)


Bert Hubert's writings (1)


Daniel Lemire's blog (2)


Krebs on Security (2)


Google AI Blog (2)


Sentry Blog RSS (2)


Weaveworks (2)


The Cloudflare Blog (2)


Earthly Blog (3)


The CircleCI Blog Feed - CircleCI (3)


Retool blog (3)


Future (3)


Pluralistic: Daily links from Cory Doctorow (4)


Engineering at Meta (4)


PlanetScale - Blog (4)


Microsoft Security Blog (5)


Blog – Hackaday (5)


The Teleport Blog (5)


The Full Feed - All of the Packet Pushers Podcasts (6)


Changelog Master Feed (6)


Stack Overflow Blog (6)


Simon Willison's Weblog: Blogmarks (8)


Towards Data Science - Medium (8)


Amazon Science Homepage (9)


Cloud Blog (20)


https://eng.uber.com/category/articles/general-engineering/

Introduction At Uber, m illions of machine learning (ML) predictions are made every second, and hundreds of applied scientists, engineers, product managers, and researchers work on ML solutions daily.   Uber wins by scaling machine learning. We recognize org-wide that a … The post ML Education at Uber: Frameworks Inspired by Engineering Principles appeared first on Uber Engineering Blog . (BACK TO TOP)

https://medium.com/schibsted-engineering

The search for the ultimate folder structure for a given project can be compared to the search for the holy grail . It does not matter if it is a frontend app written with React, Go CLI tool, or a project of UI design. At the start, you will always face the question of how you should structure it. Why are we doing it? Because we want our projects to be flexible, extensible, self-explanatory, and easy to maintain. It provides a seamless developer experience for engineers working on that project.. (BACK TO TOP)

http://notes.eatonphil.com/

This is an external post of mine. Click here if you are not redirected. (BACK TO TOP)

https://sifter.org/~simon/journal

Covid Update: Another Year of Perspective (BACK TO TOP)

https://tailscale.com/blog/

As your teams grow and become more distributed, it makes sense to limit an employee’s access based on their job function rather than to give everyone persistent access to your production environment. This not only lets you manage sensitive resources such as customer data more effectively, but it also reduces the risk of accidentally impacting production — for example, by running a query meant for your staging environment. When the time is up, the user’s access is automatically revoked. (BACK TO TOP)

https://paulbutler.org/posts/

I’ve been trying to run search ads on Google for over a month. Due to two unrelated snags, I’ve only had ~12 hours of uptime with those ads in that time. Based on conversations with other startups that run Google Ads, my experience is neither unique nor surprising. Apropos of Google’s earnings day, I wanted to vent a bit about how hard Google makes it to use the product that drives so much of their revenue. (BACK TO TOP)

https://www.timescale.com/blog/

Performance and tooling are frequently debated in the State of PostgreSQL survey, and this year was no exception. With psql remaining the number one tool for querying and admin among PostgreSQL users, we decided to compile a list of tools— that aren’t psql—to broaden your options. (BACK TO TOP)

https://buttondown.email/hillelwayne

side note do you know how hard it is to google the tree evolutionary tree? the internet pipes get all gummed up — 🎵 Tim Blais 👨🏻‍🔬 (@acapellascience) July 23, 2022 I do a lot of research for my job and over time built a vocabulary for researching concepts. This one comes up a lot so I figured I’d get it written down. Information camouflage is when piece of information A has a name similar to another, very different, much more popular piece B. For example, I wanted to find a museum about zoos.  ↩ (BACK TO TOP)

https://dropbox.tech/feed

Learn how to Dropbox as an OpenID Connect provider (BACK TO TOP)

https://monzo.com/blog/technology

Kyle joined Monzo as a COp, a customer service representative, but three years on he now works in a product team as one of our backend engineers! Kyle and his mentor Duncan share the story of how Kyle made his career switch (BACK TO TOP)

https://frankdenneman.nl

Part 4 focused on the memory consumption of a CNN and revealed that neural networks require parameter data (weights) and input data (activations) to generate the computations. Most machine learning is linear algebra at its core; therefore, training and inference rely heavily on the arithmetic capabilities of the platform. By default, neural network architectures use the […] The post Training vs Inference – Numerical Precision appeared first on frankdenneman.nl . (BACK TO TOP)

http://jvns.ca/atom.xml

Hello! The other day we talked about what happened when you press a key in your terminal . As a followup, I thought it might be fun to implement a program that’s like a tiny ssh server, but without the security. You can find it on github here , and I’ll explain how it works in this blog post. the goal: “ssh” to a remote computer Our goal is to be able to login to a remote computer and run commands, like you do with SSH or telnet. This is the end we’re going to hook up to the TCP connection.go ). (BACK TO TOP)

http://logicai.io/blog/

Introduction “We enjoyed the competition.” “Such a great event!” — such was the feedback heard from participants at this year’s Kaggle Days, a series of non-profit events for experienced data scientists. This event is a lot of fun, a hefty dose of knowledge, and a unique opportunity to meet the best in the industry and learn from Kaggle Grandmasters. During each event, three winning teams are selected, who will then be invited to participate in the offline finals in Barcelona. (BACK TO TOP)

http://muratbuffalo.blogspot.com/

This work provides a TLA+ formalization of t he state-based isolation model introduced in the PODC 2017 paper. The TLA+ models provided here will be very useful for you if you are a distributed database developer. Using these, you can show your database protocols satisfy the desired isolation levels, and as you extend the design, you can keep checking that the guarantees still hold. I have been suffering from this problem recently. I wrote a TLA+ model for a distributed database design... (BACK TO TOP)

https://berthub.eu/articles/

(scroll down for my two talks if you are in a hurry) As I write this I’m suffering from severe post-camp blues. Every four years the Dutch hacker community organizes a stupendously large multi-day campsite event, with ample international help. To a large extent, “everyone” is there. And this time, like every time, people who originally decided they could not make it.. show up by day two. Because the pull is just too strong. (BACK TO TOP)

https://lemire.me/blog

A reader (Richard Ebeling) invited me to revisit an older blog post: Parsing floats in C++: benchmarking strtod vs. from_chars. Back then I reported that switching from strtod to from_chars in C++ to parse numbers could lead to a speed increase (by 20%). The code is much the same, we go from… char * string … Continue reading Comparing strtod with from_chars (GCC 12) (BACK TO TOP)

Modern game controllers can point in a wide range of directions. Game designers sometimes want to convert the joystick direction to get 8-directional movement. A typical solution offered is to compute the angle, round it up and then compute back the direction vector. double angle = atan2(y, x); angle = (int(round(4 * angle / PI + … Continue reading Round a direction vector to an 8-way compass (BACK TO TOP)

https://krebsonsecurity.com

Microleaves, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, exposed their entire user database and the location of tens of millions of PCs running the proxy software. Microleaves claims its proxy software is installed with user consent. (BACK TO TOP)

It's been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and extortion of many AshleyMadison users, and to at least two suicides. To date, little is publicly known about the perpetrators or the true motivation for the attack. (BACK TO TOP)

http://ai.googleblog.com/

Posted by Tuan Anh Nguyen, Google Assistant and Sourish Chaudhuri, Google Research In natural conversations, we don't say people's names every time we speak to each other. Instead, we rely on contextual signaling mechanisms to initiate conversations, and eye contact is often all it takes. As virtual assistants become an integral part of our everyday lives, we're developing ways to initiate conversations more naturally. We developed Look and Talk in alignment with our AI Principles .google.com . (BACK TO TOP)

Posted by Maxim Tabachnyk, Staff Software Engineer and Stoyan Nikolov, Senior Engineering Manager, Google Research The increasing complexity of code poses a key challenge to productivity in software engineering. Code completion has been an essential tool that has helped mitigate this complexity in integrated development environments (IDEs). Recent research has demonstrated that large language models (e.g.g., Copilot ).e., leaving the IDE) when exposed to single-line ML completion.g.e.g.g. (BACK TO TOP)

https://blog.sentry.io

An app that works as expected is great, but if expected means a beachball for 10 seconds before the page loads, that’s… not so great… (BACK TO TOP)

Bugs don’t always emerge because we made mistakes, but often because of regressions in libraries or updates to frameworks, languages… (BACK TO TOP)

https://www.weave.works/

As an AWS advanced technology partner, Weaveworks has been working behind the scenes to ensure that the experience of deploying EKS Anywhere using ‘eksctl’ is as effortless as possible, but also that GitOps is readily available from the point of deployment via Flux CD . With the latest AWS announcement of EKS Anywhere (EKSA) now formally supporting bare-metal deployments , we are excited to share developments from our own Liquid Metal project . Signed at the point of build/release. 2. (BACK TO TOP)

Businesses want to release applications faster without compromising on key priorities like security and compliance. This need has paved the way for GitOps - a fast, reliable, and simplified way to do fully-automated continuous delivery. The global leader of cloud services, Amazon Web Services (AWS) , has been a longtime investor and technology partner (e.g. we jointly developed eksctl, the official CLI for Amazon EKS ) of Weaveworks. Amazon ECR allows you to publish container images. (BACK TO TOP)

https://blog.cloudflare.com/

In this blog post I'll share my journey deep into the Linux networking stack, trying to understand the memory and window management of the receiving side of a TCP connection (BACK TO TOP)

Cloudflare Deployment in Guam - Delivering a Better Internet for Faraway Pacific Ocean Archipelagos Residents (BACK TO TOP)

https://earthly.dev/blog/

Docker is an open containerization platform for developing, shipping, and running applications. It enables you to package your applications in isolated environments, called containers, where they can run independently from infrastructure. In the container, they have all the dependencies needed for the application to run. However, a common issue with Docker images is their construction and size . Docker Slim is a tool for optimizing Dockerfiles and Docker images.githubusercontent.report.json . (BACK TO TOP)

But Why? I’ve been trying to learn Golang lately. Previously, I wrote an article where I built an app for storing contacts that ran in the terminal using the tview package. This was a great first project to get me used to working with Go. After I was done, a colleague sent me a link to a list of terminal games , which got me interested in trying to build one myself. That landed me on Pong. Pong is simple. Depending on what kind of game you want to make, Tview could still be a great choice.go . (BACK TO TOP)

Recently, NoSQL Databases like MongoDB , LevelDB, Redis, and others have been preferred for building and deploying applications. MongoDB is one of the most popular and adopted NoSQL databases due to its simplicity and ease of use. The Go MongoDB driver provides functionality for using the MongoDB database in Go. The Go MongoDB driver is the official driver provided, maintained, and fully supported by MongoDB. Prerequisites Following this tutorial requires that you meet these requirements.D .g.t. (BACK TO TOP)

https://circleci.com/blog/

GitLab teams, welcome to CircleCI! Today we are pleased to announce GitLab support on CircleCI. Teams using GitLab SaaS can now build, test, and deploy on CircleCI, and access CircleCI’s most popular features like Docker layer caching and automatic test-splitting . GitLab is now the third version control system we support, in addition to GitHub and Bitbucket. GitLab teams can sign up for CircleCI today . We’ve long recognized that the world of software delivery is changing, and rapidly. (BACK TO TOP)

This tutorial covers: What conditionals are and how to use them in CI/CD pipelines Why you might want to use conditionals in your pipelines How to set up a pipeline configuration using conditional execution The DevOps practice of continuous integration and continuous deployment (CI/CD) improves software delivery. CI/CD platforms monitor and automate the application development process ensuring a better application, faster. Prerequisites The following are required to complete this tutorial: Node. (BACK TO TOP)

Self-hosted runners allow you to host your own scalable execution environments in your private cloud or on-premises, giving you more flexibility to customize and control your CI/CD infrastructure. Teams with unique security or compute requirements can set up and start using self-hosted runners in under five minutes . Most teams experience fluctuations in their resource demands throughout the workday, and maintaining unused compute capacity can result in unnecessary costs.sh .js.04 LTS .8 .data. (BACK TO TOP)

https://retool.com/blog/

We’re excited to share that we’ve raised $45M at a $3.2B valuation. Our Series C2 is a continuation of our unconventional approach to fundraising —instead of raising the maximum amount at the highest valuation, we raise small rounds at lower valuations, which minimizes dilution (BACK TO TOP)

We’re excited to share some major updates to Retool's free plan: developers and teams of up to 5 can now build unlimited Retool apps—all without paying a single dollar. (BACK TO TOP)

Today, Retool is excited to announce a new library of 90+ UI components—all tailored and optimized for internal tools and business apps. (BACK TO TOP)

https://future.com

Ethereum’s biggest-ever upgrade — the move to a proof-of-stake consensus mechanism — is right around the corner. But while the Merge should add security and sustainability, it doesn’t include sharding, the long-anticipated method of scaling the network.  In Part I of our conversation with Ethereum Foundation (EF) researcher Danny Ryan, who’s helped coordinate the upgrade... Read More The post The Future of Ethereum Upgrades, Post-Merge [Part 2] appeared first on Future . (BACK TO TOP)

After years of research, development and testing, Ethereum will transition from proof of work to proof of stake in the coming months. Instead of “miners” using computational energy to process transactions, “validators” will lock up, or stake, their assets in the network in return for ETH rewards. The upshot is increased security and a much... Read More The post What the Merge Means for Ethereum Today [Part 1] appeared first on Future . (BACK TO TOP)

Thomas Graf is the co-founder and CTO of Isovalent, and creator of a popular open source (and cloud native) networking technology called Cilium. Cilium is built atop a kernel-level Linux technology called eBPF. In this interview, Graf discusses the roles that Cilium and eBPF play in the growing cloud-native networking ecosystem, as well some broader... Read More The post Kubernetes, Networking, and Finding the VMware of Cloud Native appeared first on Future . (BACK TO TOP)

https://pluralistic.net

Today's links Your computer is tormented by a wicked god: Bootkits are why we can't have nice things. Peter Thiel's evil, but he's not an "evil genius": How to criticize self-mythologizing villains. Hey look at this: Delights to delectate. This day in history: 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Your computer is tormented by a wicked god (permalink) Computer security is really, really important.cs.cmu.wired. (BACK TO TOP)

Today's links "War Against All Puerto Ricans": Required reading for the eve of a new independence referendum. Dashcam repo: Cruising the streets with a license plate camera to win debt-collector bounties. Hey look at this: Delights to delectate. This day in history: 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading "War Against All Puerto Ricans" (permalink) Puerto Rico is back in the news. Sorta.washingtonpost.washingtonpost. https://www. (BACK TO TOP)

Today's links "A Half-Built Garden": Ruthanna Emrys's stunning First Contact novel. Hey look at this: Delights to delectate.macmillan.com/books/9781250210982/ahalfbuiltgarden I got this analysis from my editor Patrick Nielsen Hayden, nearly 20 years ago, when he was giving me his editorial notes on my debut novel Down and Out in the Magic Kingdom, and it's shaped everything I've written since." As noted, Half-Built has a perfect match between the protagonist and the world.craphound.tor.nytimes. (BACK TO TOP)

Today's links Why none of my books are available on Audible: And why Amazon owes me $3,218.55. Sarah Gailey's "Just Like Home": A haunted house novel that made the hairs on the back of my neck stand up. Hey look at this: Delights to delectate. This day in history: 2002, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Why none of my books are available on Audible (permalink) I love audiobooks.craphound." https://freedom-to-tinker. (BACK TO TOP)

https://engineering.fb.com

At Meta, our messaging apps help billions of people around the world stay connected to those who matter most to them. This scale brings potential threats from criminals and hackers, so we have a responsibility to keep people and their data safe. We’re sharing a set of principles to ensure that security is central to [...] Read More... The post Five security principles for billions of messages across Meta’s apps appeared first on Engineering at Meta . (BACK TO TOP)

– Supporting a programming language at Meta is a very careful and deliberate decision. – We’re sharing our internal programming language guidance that helps our engineers and developers choose the best language for their projects. – Rust is the latest addition to Meta’s list of supported server-side languages. At Meta, we use many different programming [...] Read More... The post Programming languages endorsed for server-side use at Meta appeared first on Engineering at Meta . (BACK TO TOP)

In 2020 we launched Instagram Messaging (referred to in this post simply as “Messaging”) for personal desktop computers. We believe that this feature will improve everyday experiences and enable new use cases for all of our desktop web users. In this post, we go through some of our overall learnings from our desktop users, and [...] Read More... The post Launching Instagram Messaging on desktop appeared first on Engineering at Meta . (BACK TO TOP)

The leap second concept was first introduced in 1972 by the International Earth Rotation and Reference Systems Service (IERS) in an attempt to periodically update Coordinated Universal Time (UTC) due to imprecise observed solar time (UT1) and the long-term slowdown in the Earth’s rotation. This periodic adjustment mainly benefits scientists and astronomers as it allows [...] Read More... The post It’s time to leave the leap second in the past appeared first on Engineering at Meta . (BACK TO TOP)

https://planetscale.com

Handle MySQL increment counter bursts with the Slotted Counter Pattern Read the full story (BACK TO TOP)

Learn how we leveraged Vitess ACLs and VTTablet to build our password roles functionality Read the full story (BACK TO TOP)

Learn about how we're making it safer to drop tables and easier to detect if they're still in use. Read the full story (BACK TO TOP)

Learn how to create a more reliable workflow with Temporal and PlanetScale Read the full story (BACK TO TOP)

https://www.microsoft.com/security/blog/

Chief Executive Officer and owner of Ampere Industrial Security Patrick C. Miller discusses the security and hiring challenges of protecting industrial systems. The post Industrial systems: What it takes to secure and staff them appeared first on Microsoft Security Blog . (BACK TO TOP)

MSTIC and MSRC disclose technical details of a private-sector offensive actor (PSOA) tracked as KNOTWEED using multiple Windows and Adobe 0-day exploits, including one for the recently patched CVE-2022-22047, in limited and targeted attacks against European and Central American customers. The post Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits appeared first on Microsoft Security Blog . (BACK TO TOP)

Attackers are increasingly leveraging managed IIS extensions as covert backdoors into servers, providing a durable persistence mechanism for attacks. The post Malicious IIS extensions quietly open persistent backdoors into servers appeared first on Microsoft Security Blog . (BACK TO TOP)

Microsoft Partner Director of Identity Security Alex Weinert talks with Nitika Gupta, a Microsoft Principal Product Manager who leads the team responsible for enterprise admin capabilities for identity security. The post How one Microsoft product manager acts as champion for identity security appeared first on Microsoft Security Blog . (BACK TO TOP)

Just like our customers, Microsoft has been on a compliance journey. Here’s what we’ve learned about the most effective mindset and tools to manage compliance. The post Discover 5 lessons Microsoft has learned about compliance management appeared first on Microsoft Security Blog . (BACK TO TOP)

https://hackaday.com

Make enough attempts to cut foam using whatever you’ve got — utility knife, hacksaw, serrated plastic knife — and you’ll wish hard for something that cuts cleaner, faster, and better. …read more (BACK TO TOP)

[Gili Yankovitch] has always wanted some kind of macro keypad for all those boss-slaying combos he keeps up the sleeve of his wizard robe while playing WoW. Seventeen years later, …read more (BACK TO TOP)

The C64 may be the best-selling computer of all time, but Commodore made several machines before that, too. [Mjnurney] always loved the Commodore PET, and set about building some new …read more (BACK TO TOP)

As ubiquitous as rubber tires are due to the many practical benefits they offer to cars, trucks, and other conveyances, they do come with a limited lifespan. Over time, the …read more (BACK TO TOP)

While most people may think that a keyboard is just a board with keys, those who read Hackaday will no doubt know that there’s an infinite variety of beautiful designs …read more (BACK TO TOP)

https://goteleport.com/blog/

Teleport has just joined the FIDO Alliance to bring this improved mix of security and usability to infrastructure resources. (BACK TO TOP)

Announcing the release of Teleport 10.0 which adds support for passwordless logins to infrastructure. (BACK TO TOP)

Introducing all the features released and scheduled for Teleport 10. (BACK TO TOP)

How to set up Production MySQL SSL/TLS using Teleport Machine ID. (BACK TO TOP)

How to secure a MySQL Database with SSL/TLS for MySQL 8 and Ubunutu 22.04. (BACK TO TOP)

https://packetpushers.net

In this IPv6 Buzz podcast episode Ed, Scott, and Tom--with tongues firmly in cheek---discuss some of the ways to avoid or put off IPv6 adoption until you can retire. The post IPv6 Buzz 106: How To Retire Before You Have To Deploy IPv6! appeared first on Packet Pushers . (BACK TO TOP)

It's hard to guarantee quality of experience for users accessing cloud applications. The users are connected via networks we don’t own, and the apps are hosted on networks we don’t own. So what can a network operations team do about quality of experience in a world of cloud-hosted apps and cloud-connected users? Sponsor Broadcom Software is here to help us answer this question. (BACK TO TOP)

Today's Full Stack Journey podcast is all about Pixie, an "open source observability tool for Kubernetes applications." Pixie takes advantage of eBPF to capture telemetry data. Joining Scott to provide a beginner-level overview of Pixie is Fabian Ngala. The post Full Stack Journey 068: An Introduction To Pixie For Open-Source Kubernetes Observability appeared first on Packet Pushers . (BACK TO TOP)

Today on the Tech Bytes podcast we welcome back sponsor Nokia to talk about a compelling feature in Nokia’s Fabric Services System. This feature, called Connect, lets Fabric Services System integrate with platforms such as VMware, OpenStack, and Kubernetes to streamline the provisioning of network services in Top Of Rack switches when new workloads or services are instantiated. (BACK TO TOP)

Take a Network Break! This week we cover new DLP capabilities from Cato Networks, updates to the open-source Cilium project for your eBPF and service mesh needs, why Cisco is streamlining how partners can offer Webex as a managed service, and more IT news coverage. The post Network Break 391: IT Spending To Rise; Rating Your Emotional Response To Vendor Products appeared first on Packet Pushers . (BACK TO TOP)

In today’s sponsored Heavy Networking podcast we dive into Juniper Cloud Metro, which includes new appliances, software, and integrations with other Juniper services to address the entire business of ownership and operations. Our guests are Kanika Atri, Sr. Director, Product Management; and Tim Pennell, Sr. Director, Product Management. The post Heavy Networking 639: Juniper Cloud Metro Boosts Metro Performance, Efficiency And Sustainability (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

https://changelog.com/master

Go 1.18 was a major release where we saw the introduction of generics into the language as well as other notables such as fuzzing and workspaces. With Go 1.19 slated to come out next month, one has to wonder what’s next. Are we in store to be blown away by new and major features like we saw in 1.18? Not exactly but there are still lots of improvements to be on the lookout for. Joining Mat & Johnny to touch on some of the most interesting ones is Carl Johnson, himself a contributor to the 1. (BACK TO TOP)

We know that many of you listen to this podcast while running 🏃‍♀️ or cycling 🚴‍♂️ Hey Dan! How many of you cycled to a conference? Gerhard knows a single person that cycled 764 miles for 8 days straight from Switzerland to Spain for this year’s KubeCon EU. His name is Johann Gyger, a CNCF ambassador & a cloud consultant at Peak Scale. Johann is a cloud engineer at heart that is all in on sustainability. (BACK TO TOP)

In this Fully-Connected episode, Chris and Daniel explore the geopolitics, economics, and power-brokering of artificial intelligence. What does control of AI mean for nations, corporations, and universities? What does control or access to AI mean for conflict and autonomy? The world is changing rapidly, and the rate of change is accelerating. Daniel and Chris look behind the curtain in the halls of power. (BACK TO TOP)

Brandur thinks soft deletion probably isn’t worth it, the orange website delivers a high quality discussion on data structures, Podge O’Brien drops satirical management advice, team pico delivers prose.sh, Mat Ryer shares his thoughts on estimations & Matt Rickard’s thoughts on RSS have us thinking about it as well. (BACK TO TOP)

This week we’re joined by On Freund, former VP of Engineering at WeWork and now co-founder & CEO of Wilco. WeWork you may have heard of, but Wilco maybe not (yet). We get into the details behind the tech and scaling of WeWork, comparisons of the fictional series on Apple TV+ called WeCrashed and how much of that is true. Then we move on to Wilco which is what has On’s full attention right now. Wilco has the potential to be the next big thing for developers to acquire new skills. (BACK TO TOP)

What’s this? A Frontend Feud! The ShopTalk guys return to defend their championship over Syntax against new contenders: Una and Adam from The CSS Podcast! (BACK TO TOP)

https://stackoverflow.blog

Spoken languages have distinct levels to measure skills; why shouldn't programming languages, too? The post Measurable and meaningful skill levels for developers appeared first on Stack Overflow Blog . (BACK TO TOP)

It’s been a busy quarter for the company. We celebrated a handful of big milestones over the last three months. We added a new Chief Technology Officer, Jody Bailey, to our leadership team, announced Stack Overflow for Teams entering the Microsoft Azure Marketplace, launched exciting initiatives like Staging Ground, and released insights from this year’s Developer Survey. The post Always learning appeared first on Stack Overflow Blog . (BACK TO TOP)

Lauren Peate, founder and CEO of Multitudes, joins the home team for a conversation about how managers and executives can support their development teams through ethical data and analytics practices. Plus: What it’s like to launch a startup in a smaller country like New Zealand. The post Data analytics: Less creepy, more empowering appeared first on Stack Overflow Blog . (BACK TO TOP)

Turns out the robots are here to make your job more interesting. The post Automate the boring parts of your job appeared first on Stack Overflow Blog . (BACK TO TOP)

Money that moves at the speed of information, a conversation with Stack Overflow's new CTO Jody Bailey, and and exploring how Rust manages memory. The post The Overflow #135: Money that moves at the speed of information appeared first on Stack Overflow Blog . (BACK TO TOP)

The home team talks game development and PowerPoint, the good ol’ days of Game Boy, and wild facts about the largest species in the deer family. Plus: Was that summer everyone was playing Pokémon GO the closest we’ll ever get to world peace? The post Game Boy emulators, PowerPoint developers, and the enduring appeal of Pokémon GO (Ep. 466) appeared first on Stack Overflow Blog . (BACK TO TOP)

http://simonwillison.net/

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

https://towardsdatascience.com

Designing a machine learning product to close the user-feedback loop Photo by Jon Tyson on  Unsplash Imagine this “hypothetical” scenario: a new model was developed to replace the existing production model, due to detected low accuracies for some “important” classes. The new model’s metrics were much better, hence it was deployed to replace the current model. Turns out, the new model actually made the user experience worse . This assumption is critically flawed. Resource vs.e. in production).e. (BACK TO TOP)

Photo by Possessed Photography on  Unsplash Methods to replace the necessity of a contamination level in outlier detection Real life is often chaotic and unpredictable. It seems to like throwing the metaphorical “spanner in the works”, making data usually appear baffling and random. Most data that is recorded or extracted generally requires some form of cleaning before applying further methods like modeling. That is where the techniques of outlier detection comes in. <a href="https://medium.cs. (BACK TO TOP)

Building machine learning models in the cloud: A paradigm shift Distinguishing between persistent and ephemeral compute for machine learning development Photo by Pero Kalimero on  Unsplash In 2017, I ran my first machine learning (ML) model in the cloud, however, at that time I wasn’t aware of it. From my perspective, I was simply connecting to this thing called “the remote server” and executing my python scripts.e. The number of projects increased and the size of data science teams got bigger. (BACK TO TOP)

Partition-based loading or tracking the history of your downstream model with incremental loads Photo by Alex wong on  Unsplash Incremental models in dbt are not a new invention, they are the traditional way of appending data into a table. In old-school datawarehouses, this would be the way to bring the daily data to your data storage environment. dbt has already great documentation on incremental models https://docs.getdbt. You have event data that is immutable and has a timestamp.google. (BACK TO TOP)

A feature store origin story Photo by Mikael Blomkvist: https://www.pexels.com/photo/simple-workspace-at-home-6476588/ In the beginning Once upon a time, in a land far, far away, I was one of the hundreds of Data Analysts working for a Fortune 50 company. As luck would have it, I got promoted as one of the company’s first Data Scientists in 2014, alongside some fresh new-hires who had PhDs and years of predictive modeling experience. I thought that I was totally out of my league. (BACK TO TOP)

Image by author At Typeform we’ve adopted GrowthBook as our experimentation platform for AB testing. GrowthBook calculates 3 Bayesian statistics on your metrics to help you draw conclusions about your new features: Uplift Chance to Beat Control Loss or Risk of Choosing Variant In this article I’ll explain what they are and how to interpret them. For simplicity, I’ve limited the random fluctuations to just the variant. In Exp 3 we’re pretty much guaranteed (99. That’s where the loss comes in.5%. (BACK TO TOP)

A few words on the hottest models in the field Photo by Wim van 't Einde on  Unsplash Machine Learning is a notoriously intricate field practised by academics and industries alike, constantly improving on its benchmarks and spawning interesting ideas and problem-solving approaches. It has been deployed successfully in countless practical applications in many different fields before even a proper theory has been developed explaining why it works. Target series and covariates [3].e. [1] H. [2] P. (BACK TO TOP)

Dependency management and packaging with Poetry Continue reading on Towards Data Science » (BACK TO TOP)

https://www.amazon.science/

Donato Crisostomi talks about how his mother helped spark a love of knowledge that led him to two science internships at Amazon. (BACK TO TOP)

This year’s class includes applied science, research science, and data science interns. (BACK TO TOP)

Nafea Bshara, AWS vice president and distinguished engineer, discusses Annapurna Lab’s path to silicon success; Annapurna co-founder will be a featured speaker in August 3 AWS Silicon Innovation Day virtual event. (BACK TO TOP)

Amazon is helping develop standards for post-quantum cryptography and deploying promising technologies for customers to experiment with. (BACK TO TOP)

Prem Natarajan, Alexa AI vice president of natural understanding, visited the campus to engage with young STEM researchers from historically underrepresented backgrounds. (BACK TO TOP)

Pioneering web-based PackOpt tool has resulted in an annual reduction in cardboard waste of 7% to 10% in North America, saving roughly 60,000 tons of cardboard annually. (BACK TO TOP)

Combining a cutting-edge causal-inference technique and end-to-end machine learning reduces root-mean-square error by 27% to 38%. (BACK TO TOP)

New EMNLP workshop will feature talks, papers, posters, and a competition built around the 50-plus-language, million-utterance MASSIVE dataset. (BACK TO TOP)

Amazon's Bernhard Schölkopf and Dominik Janzing are first and second authors on "breakthrough 2012 paper". (BACK TO TOP)

https://cloud.google.com/blog/

Pub/Sub ’s ingestion of data into BigQuery can be critical to making your latest business data immediately available for analysis. Until today, you had to create intermediate Dataflow jobs before your data could be ingested into BigQuery with the proper schema. While Dataflow pipelines (including ones built with Dataflow Templates) get the job done well, sometimes they can be more than what is needed for use cases that simply require raw data with no transformation to be exported to BigQuery. (BACK TO TOP)

After a successful certification beta , we’re excited to share that the Professional Cloud Database Engineer certification is now generally available.  This new certification allows you to showcase your ability to manage databases that power the world’s most demanding workloads.  Google Cloud certifications have proven to be critical for employees and businesses looking to adopt cloud technologies. Start with the exam guide and familiarize yourself with the topics covered... Read Article (BACK TO TOP)

Student mental health is an important topic for institutions and the pandemic made this even more paramount. According to a recent  CDC study , the less connected a student is to individuals at their schools, the more likely they are to experience mental health challenges. However, these connections don’t need to be solely physical to be beneficial. Learners experience similar mental health benefits from connections in the digital world too. This can be challenging.  håp  is one of these apps. (BACK TO TOP)

Welcome to this month’s Cloud CISO Perspectives. Starting with this issue, we’re going to add even more top-of-mind content based on the hot topics we see emerge across the industry and with our customers, globally.  Today, we're focusing on the evolving relationship between an organization's boardroom and its cybersecurity practice, especially in the context of digital transformation to the cloud.” Sometimes, an organization’s board is more cautious than its IT and security leadership teams.S.. (BACK TO TOP)

Preventing data breaches is an important priority when creating and managing database environments. Ensuring user and application passwords meet high security standards is crucial for reducing risk and helping to achieve compliance with best practices and regulatory standards. To address these concerns, we are thrilled to announce the general availability of Local Users Password Validation feature for Cloud SQL for PostgreSQL and MySQL . The IAM service has its own password policy settings . (BACK TO TOP)

This blog presents an open-source solution to heterogeneous graph sub-sampling at scale using Google Cloud Dataflow (Dataflow). Dataflow is Google’s publicly available, fully managed environment for running large scale Apache Beam compute pipelines. Dataflow provides monitoring and observability out of the box and is routinely used to scale production systems to easily handle extreme datasets. In the figure there are two entities, “Paper” and “Author”.train..wagtailcore.rich_text.wagtailcore. (BACK TO TOP)

Editor's note : This blog was originally published by Siemplify on Feb. 19, 2021. The number of unfilled cybersecurity jobs stretches into the millions , and a critical part of the problem is the length of time it takes to backfill a position. Industry group ISACA has found that the average cybersecurity position lies vacant for up to six months. Training new analysts can be a daunting task. They need time to get acquainted with the SOC’s technology stack and processes. Enter automation. (BACK TO TOP)

R is one of the most widely used programming languages for statistical computing and machine learning. Many data scientists love it, especially for the rich world of packages from tidyverse , an opinionated collection of R packages for data science. Besides the tidyverse, there are over 18,000 open-source packages on CRAN , the package repository for R. For R, you build a container yourself, derived from Google Cloud Deep Learning Containers for R .S.wagtailcore.rich_text.wagtailcore.rich_text. (BACK TO TOP)

With Google Cloud Firestore, we can develop rich mobile, web and IoT applications using a fully managed, scalable, and serverless No-SQL document database that horizontally scales to meet any demand, with no maintenance. Some of my favorite features of Firestore besides the fact that it is fully managed, serverless and that it effortlessly auto scales up or down to meet any demand with no maintenance windows or downtime are that it has 1. High availability (99.99–99.firebase.google.0 token.3.3.. (BACK TO TOP)

Running time-based, scheduled workflows to implement business processes is regular practice at many financial services companies. This is true for Deutsche Bank, where the execution of workflows is fundamental for many applications across its various business divisions, including the Private Bank, Investment and Corporate Bank as well as internal functions like Risk, Finance and Treasury. “Cloud Composer is our strategic workload automation (WLA) tool.e. (BACK TO TOP)

In this post, we discuss how those lessons apply to your SOC, and center them on another SRE principle—Service Level Objectives (SLOs). Even though industry definitions can vary for these terms, SLI, SLO, and SLA have specific meanings, wrote the authors of the Service Level Objectives chapter in our e-book, “ Site Reliability Engineering: How Google runs production systems .” (All subsequent quotes come from the SLO chapter of the book, which we’ll refer to as the “SRE book..... Read Article (BACK TO TOP)

Over the past few years, advances in training large language models (LLMs) have moved natural language processing (NLP) from a bleeding-edge technology that few companies could access, to a powerful component of many common applications. From chatbots to content moderation to categorization, a general rule for NLP is that the larger the model, the greater the accuracy it’s able to achieve in understanding and generating language.7X faster in computation than before.7x . Read Article (BACK TO TOP)

Editor’s note : Renault, the French automaker, embarked on a wholesale migration of its information systems—moving 70 applications to Google Cloud. Here’s how they migrated from Oracle databases to Cloud SQL for PostgreSQL. The Renault Group, known for its iconic French cars has grown to include four complementary brands, and sold nearly 3 million vehicles in 2020. It was an ambitious project, but it’s paid off. Google Cloud stood out as the clear choice for its data capabilities.g... (BACK TO TOP)

Once you have identified who a user is (authenticated them) using Cloud Identity , the next step is to define what they can do on Google Cloud (authorize them) so they can access the resources they are permitted to use. Access control for Google Cloud resources is managed by Cloud IAM policies for humans and by service accounts for non-humans (applications and services). Let’s take a closer look at Cloud IAM and service accounts. IAM policies manage access control for Google Cloud resources.e. (BACK TO TOP)

Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more.  Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here:  Google Cloud blog 101: Full list of topics, links, and resources . Learn more . Learn More. Learn More . Read more in our blog post. Google Cloud introduces Batch . Read more in the launch blog.  Learn More .37.37. (BACK TO TOP)

Data continues to grow in volume and is increasingly distributed across lakes, warehouses, clouds, and file formats. As more users demand more use cases, the traditional approach to build data movement infrastructure is proving difficult to scale. Unlocking the full potential of data requires breaking down these silos, and is increasingly a top priority for enterprises. This allows customers to build secure multi-cloud data lakes over open file formats... Read Article (BACK TO TOP)

As we shared at the beginning of the year, we are making significant investments in Google Cloud Marketplace to accelerate growth for our customers and partners. This includes new technical capabilities that provide the purchasing flexibility and choice our enterprise customers need when buying software from Google Cloud partners through Marketplace. With these new and expanded deal-making capabilities, Google Cloud partners can help our shared customers buy the way they want. Read Article (BACK TO TOP)

Editor's note : This blog was originally published by Siemplify on April 29, 2021. With cybersecurity moving from backroom to boardroom, and the societal imperative that workplace cultures renounce toxicity for more sensitivity and tolerance, there is a rapidly-growing call for empathy to pervade the infosec function, from the CISO all the way down. Within security operations, challenges often boil down to alert fatigue, skills shortages and lack of visibility . And we have ours. (BACK TO TOP)

In the fragmented world of U.S. healthcare, patients often have to wait in line or on hold, navigate multiple patient portals, and fill out numerous request forms—all in pursuit of their own medical history. Healthcare technology startup PicnicHealth is on a mission to put control back with the patient, where it belongs.  The company does the heavy lifting of collecting records and leverages human-in-the-loop ML to transcribe and validate them with an abstraction team of medical professionals. (BACK TO TOP)

We launched session affinity for Cloud Run services this June (in preview). You can use session affinity to improve responsiveness of services that store client-specific state on container instances.  In this blog, I’ll dive deeper into when session affinity is useful for you and I’ll show you how it works on Cloud Run. With session affinity enabled, requests from the same client are routed to the same container instance (if it is available). There are two ways to run your code on Cloud Run.js.  (BACK TO TOP)

Bulletin by Jakub Mikians