Skip to content

Latest commit

 

History

History
1970 lines (931 loc) · 107 KB

bulletin-2022-12-09.md

File metadata and controls

1970 lines (931 loc) · 107 KB

Bulletin for Friday, 09 Dec 2022

7 days digest


Think Fast, Talk Smart: Communication Techniques (1)


Tech Notes (1)


Stratechery by Ben Thompson (1)


dropbox.tech (1)


The Pragmatic Engineer (1)


High Scalability (1)


Bert Hubert's writings (1)


Programming Digest (1)


Speculative Branches (1)


The Cloudflare Blog (1)


Mozilla Hacks – the Web developer blog (1)


Earthly Blog (1)


ongoing by Tim Bray (1)


Almost Secure (1)


Netflix TechBlog - Medium (1)


Home on Erik Bernhardsson (1)


The Technium (1)


Vallified (1)


Project Zero (1)


A Few Thoughts on Cryptographic Engineering (1)


Computer Things (1)


Robert Heaton | Blog (1)


Tech at Meta (1)


Blog on Tailscale (1)


Weaveworks (2)


Krebs on Security (2)


PlanetScale - Blog (2)


DTN (2)


Daniel Lemire's blog (2)


Microsoft Security Blog (2)


Blog – Hackaday (2)


Timescale Blog (2)


Sentry Blog RSS (3)


Maximum Effort, Minimum Reward (3)


Writing - rachelbythebay (3)


LinkedIn Engineering (3)


Julia Evans (3)


Kuba Filipowski (3)


The CircleCI Blog Feed - CircleCI (3)


The Full Feed - All of the Packet Pushers Podcasts (4)


Google AI Blog (4)


Retool Blog (4)


Simon Willison's Weblog: Blogmarks (5)


Towards Data Science - Medium (5)


Changelog Master Feed (6)


Pluralistic: Daily links from Cory Doctorow (6)


Stack Overflow Blog (6)


fasterthanli.me (7)


Amazon Science homepage (10)


Cloud Blog (20)


https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast

As a communication expert, Alison Wood Brooks spends a lot of time talking about talking. But, as she says, listening is just as important. “My course is called TALK,” says Wood Brooks, who is the O'Brien Associate Professor of Business Administration and Hellman Faculty Fellow at Harvard Business School. “The great irony is that it should really be called LISTEN . It’s hard to be a good listener yet so very important. See Privacy Policy at https://art19.com/privacy#do-not-sell-my-info . (BACK TO TOP)

https://neugierig.org/software/blog/atom.xml

It's been around 10 years since I worked on Chrome. Here are some stories that have surely been embellished by my own memory over that decade of distance. Treat them all as only maybe 60% true. I figured I could at least write them down before I totally forget them. What I did. I worked on Chrome from the early days, from 2007 to 2012, which just about covers the second half of my twenties. Today it has more than 2.5 billion users. See my first public post there... The Glenhead. In retrospect... (BACK TO TOP)

https://stratechery.com

The first obvious casualty of large language models is homework: the real training for everyone, though, and the best way to leverage AI, will be in verifying and editing information. (BACK TO TOP)

https://dropbox.tech/feed

When Magic Pocket adopted SMR drives in 2017, one of the design decisions was to use SSDs as a write-back cache for live writes. The main motivation was that SMR disks have a reputation for being slower for random writes than their PMR counterparts. To compensate, live writes to Magic Pocket were committed to SSDs first and acknowledgements were sent to upstream services immediately. The design worked well for us over the years.5-2 PBs of raw data.5x. There have been other benefits, too. (BACK TO TOP)

https://blog.pragmaticengineer.com/

Dozens of tech companies are starting to have their staff return to the office. I talked with software engineers and managers at these companies. Are we seeing the start of a trend? (BACK TO TOP)

http://highscalability.com/blog/

Never fear, HighScalability is here!   1958: An engineer wiring an early IBM computer 2021: An engineer wiring an early IBM quantum computer. @enclanglement   My Stuff: I'm proud to announce a completely updated and expanded version of Explain the Cloud Like I'm 10 ! This version adds 2x more coverage, with special coverage of AWS, Azure, GCP, and K8s. It has 482 mostly 5 star reviews on Amazon. Number Stuff: (BACK TO TOP)

https://berthub.eu/articles/

UPDATE: Nu ik niet meer werk voor de TIB kan deze uitleg van de nieuwe wet weer online. Via dit artikel zijn interviews en podcasts te vinden met meer context. Het kabinet heeft een wetsvoorstel gepubliceerd wat het toezicht en de bevoegdheden van de inlichtingen- en veiligheidsdiensten ingrijpend verandert. Tot 17 april was het mogelijk online een reactie in te dienen, en die zijn hier te vinden. De reacties van het college voor de rechten van de mens en electrospaces. (BACK TO TOP)

https://programmingdigest.net

#501 – December 05, 2022 Cache invalidation really is one of the hardest problems in computer science My colleagues recently wrote a great post on the Netflix tech blog about a tough performance issue they wrestled with. They ultimately diagnosed the problem as false sharing, which is a performance problem that involves caching. Zero to a Hundred Deploys (sponsor) An average software team deploys between once per week and once per month. This article digs into some numbers. (BACK TO TOP)

https://specbranch.com/

As you build a computer system, little things start to show up: maybe that database query is awkward for the feature you are building, or you find your server getting bogged down transferring gigabytes of data in hexadecimal ASCII, or your app translates itself to Japanese on the fly for hundreds of thousands of separate users. (BACK TO TOP)

https://blog.cloudflare.com/

I am excited to announce that as of November 1, I have joined Cloudflare as Country Manager of South Korea to help build a better Internet and to expand Cloudflare’s growing customer, partner, and local teams in Korea. (BACK TO TOP)

https://hacks.mozilla.org/

A product is first an idea, then a project, and then a prototype. Here, at Mozilla, our awesome community is there every step of the way to support and contribute to our products. None of what we do would be possible without this multicultural, multilingual community of like-minded people working together to be a better internet. The post How the Mozilla Community helps shape our products appeared first on Mozilla Hacks - the Web developer blog . (BACK TO TOP)

https://earthly.dev/blog/

When you have a potentially complex infrastructure, adding observability helps with easier debugging and performance optimization. To build observability into the infrastructure, you can use Grafana , an open-source visualization and analytics platform that aids in exploring observability data, such as metrics and logs. You can run Grafana in Docker containers. In this article, you’ll learn more about Grafana, its use cases, and how to implement Grafana in Docker ./grafana.ini:etc/grafana. (BACK TO TOP)

https://www.tbray.org/ongoing/ongoing.atom

(BACK TO TOP)

https://palant.info/

Let me say it up front: breaking up end-to-end-encrypted HTTPS connections is bad. No matter why you think that you need to inspect and/or modify the contents of an HTTPS connection, please consider not doing it. And if you still think that you absolutely need it, please sit down and consider again just not doing it. Unfortunately, I know that way too often this advice won’t be followed. Or companies which do it because they want to see everything happening on their network. Let me explain.3. (BACK TO TOP)

https://netflixtechblog.com

by Jasmine Omeke , Obi-Ike Nwoke , Olek Gorajek Intro This post is for all data practitioners, who are interested in learning about bootstrapping, standardization and automation of batch data pipelines at Netflix. You may remember Dataflow from the post we wrote last year titled Data pipeline asset management with Dataflow . That article was a deep dive into one of the more technical aspects of Dataflow and didn’t properly introduce this tool in the first place...g. . ├── backfill.sch.sch.sch.k. (BACK TO TOP)

https://erikbern.com/

Long story short: I'm working on a super cool tool called Modal. Please check it out — it lets you run things in the cloud without having to think about infrastructure. Scaling out, scheduling, containerization, using GPUs, setting up webhooks, and all kinds of other stuff. (BACK TO TOP)

https://kk.org/thetechnium

How will we humans respond to the coming decline in global population at end of this century? One response is pronatalism tech now. Here is one inside view. https://t.co/YQ5yx0POMR — Kevin Kelly (@kevin2kelly) November 28, 2022 (BACK TO TOP)

https://www.philipotoole.com

rqlite is a lightweight, open-source, distributed relational database written in Go, which uses SQLite as its storage engine. 7.12.0 provides more convenient options for removing nodes from clusters, as well as more graceful shutdown options. You can download the release from GitHub. The post rqlite 7.12.0 released appeared first on Vallified . (BACK TO TOP)

https://googleprojectzero.blogspot.com/

Seth Jenkins, Project Zero This blog post details an exploit for CVE-2022-42703 (P0 issue 2351 - Fixed 5 September 2022), a bug Jann Horn found in the Linux kernel's memory management (MM) subsystem that leads to a use-after-free on struct anon_vma . As the bug is very complex (I certainly struggle to understand it!), a future blog post will describe the bug in full. Setting the scene Successfully triggering the underlying vulnerability causes folio->mapping to point to a freed anon_vma object.. (BACK TO TOP)

https://blog.cryptographyengineering.com

You might have seen the news today that Apple is announcing a raft of improvements to Macs and iOS devices aimed at improving security and privacy. These include FIDO support, improvements to iMessage key verification, and a much anticipated announcement that the company is abandoning their plans for (involuntary) photo scanning. While every single one … Continue reading Why encrypted backup is so important → (BACK TO TOP)

https://buttondown.email/hillelwayne

Sorry this newsletter is late! Monday I ran a 35 person online TLA+ workshop. Overall I think it went pretty well! There’s a bunch of bugs to iron out and a bunch of improvements I want to make, then I’ll run it again in maybe February. I’ve got one more talk to do this Friday and then I’m done with my contracting work for the year! Now I don’t know about you, but everybody I know in tech is talking about the new “GPT-3.5” (https://chat.openai.com/). Inscrutable algorithms lead to superstition. (BACK TO TOP)

https://robertheaton.com

Are you building a Gameboy emulator ? Are you stuck? Are you failing Blargg’s test ROMs and can’t work out why? Gameboy Doctor can help! ( GitHub link ) What is Gameboy Doctor? Gameboy Doctor is a tool that compares your emulator to an example emulator that passes Blargg’s test ROMs. It finds the exact tick where your emulator’s state diverges from the example, helping you isolate and fix your bugs. Requirements Just Python3, no third-party libraries. How do I use Gameboy Doctor? 0. 1. 3. 4... (BACK TO TOP)

https://tech.facebook.com/

Atish Banerjea Job Title: Chief Information Officer Years at Meta: 6 Education: Master of Science Computer Information Systems, Temple University; Bachelor of Commerce, Delhi University. Hometown: New Delhi, India Tell us about your role as Chief Information Officer at Meta. Atish Banerjea: I run our Enterprise Engineering team. We’re responsible for building the internal products [...] (BACK TO TOP)

https://tailscale.com/blog/

Fast user switching has come to Tailscale! Starting in v1.34, out today, you’ll be able to quickly switch between Tailscale accounts on the same device, without re-authenticating. ( We heard you .) To switch between tailnets on macOS, click on the Tailscale icon in the menu bar and select the other account. Now, you can switch to a different account (say, Alice on the example.com tailnet), just by typing in the terminal: tailscale switch alice@example.com You’ll connect in seconds. (BACK TO TOP)

https://www.weave.works/

We are excited to announce the release of a new feature that brings greater control to cloud-native operations at scale. Weave GitOps Workspaces now allows platform teams to define custom environments for application developers and development teams. Workspaces benefit both the platform team as well as application development teams. This is a continuation from a previous post we recently published on multi-tenancy . Let’s look at each of the options in detail. In this case, there is no tenancy.. (BACK TO TOP)

A promising standard for continuous delivery and organizational practices, GitOps has grown past its niche of Kubernetes cluster management. With numerous recent developments in this field, users now have access to multiple ways of dealing with both applications and infrastructure - even beyond the Kubernetes ecosystem. This is made possible thanks to an integration between Weave GitOps and Upbound . This is the topic of an upcoming webinar Weaveworks and Upbound are hosting together. (BACK TO TOP)

https://krebsonsecurity.com

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers on targeting healthcare organizations that offer consultations over the Internet and sending them booby-trapped medical records for the "patient." The other involves carefully editing email inboxes of public company executives to make it appear that some were involved in insider trading. (BACK TO TOP)

In December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible for operating Glupteba, one of the Internet's largest and oldest botnets. The defendants, who initially pursued a strategy of counter suing Google for tortious interference in their sprawling cybercrime business, later brazenly offered to dismantle the botnet in exchange for payment from Google. The judge in the case was not amused, found for the plaintiff, and ordered the defendants and their U.S. (BACK TO TOP)

https://planetscale.com

Learn how to configure your database in a multi-region Rails application to decrease latency across the globe. Read the full story (BACK TO TOP)

Learn how to encrypt your connection strings so that not even AWS can access them. Read the full story (BACK TO TOP)

https://www.dtn.com/

Refined Fuels Analyst Brian Milne joins Field Posts to discuss European natural gas demand and how that’s likely to affect the global supply and demand picture. The post E128: Fuel Markets Meet Cold Winter appeared first on DTN . (BACK TO TOP)

In today's environment, fuel buying for municipal fleets provides plenty of challenges. Our blog shares four helpful steps to make your job easier and help you better serve your communities — and build greater trust. The post Four Steps to Better Municipal Fleet Fuel Purchasing appeared first on DTN . (BACK TO TOP)

https://lemire.me/blog

Let us say that I ask you to find the number I am thinking about between -1000 and 1000, by repeatedly guessing a number. With each guess, I tell you whether your guess is correct, smaller or larger than my number. A binary search algorithm tries to find a value in an interval by repeating … Continue reading Fast midpoint between two integers without overflow (BACK TO TOP)

Modern processors have powerful vector instructions which allow you to load several values at once, and operate (in one instruction) on all these values. Similarly, they allow you to have vector constants. Thus if you wanted to add some integer (say 10001) to all integers in a large array, you might first load a constant … Continue reading Optimizing compilers reload vector constants needlessly (BACK TO TOP)

https://www.microsoft.com/en-us/security/blog/

The updated threat matrix for Kubernetes comes in a new format that simplifies usage of the knowledge base and with new content to help mitigate threats. The post Mitigate threats with the new threat matrix for Kubernetes appeared first on Microsoft Security Blog . (BACK TO TOP)

Microsoft security researchers investigate an attack where the threat actor, tracked DEV-0139, used chat groups to target specific cryptocurrency investment companies and run a backdoor within their network. The post DEV-0139 launches targeted attacks against the cryptocurrency industry appeared first on Microsoft Security Blog . (BACK TO TOP)

https://hackaday.com

Over the last couple years, we’ve seen an absolute explosion of masked stereolithography (MSLA) 3D printers that use an LCD screen to selectively block UV light coming from a powerful …read more (BACK TO TOP)

The idea of sending robots into conditions that humans would not survive is a very old concept. Robot’s don’t heed oxygen, food, or any other myriad of human requirements. They …read more (BACK TO TOP)

https://www.timescale.com/blog/

Read this blog post to learn what time-series analysis is and why and how you should use it. (BACK TO TOP)

Designing a delightful, user-centered UI is a huge part of building a seamless developer experience for time-series data. Join us on a journey through the evolution of the Timescale Cloud UI, as we share our latest upgrade and all the lessons we learned. (BACK TO TOP)

https://blog.sentry.io

Taking a look at where mobile app development is headed, and exploring the new declarative approach used by the new native frameworks SwiftUI and Jetpack Compose. (BACK TO TOP)

Errors are part of building software. Even if you are one of the fabled 10X engineers, errors are still going to happen. When an error does… (BACK TO TOP)

Ranked as one of New York Magazine’s best smart home training solutions 2022 and Men’s Health’s best connected cable machine 2022, Tonal literally sets the bar for smart home trainers. (BACK TO TOP)

https://maximumeffort.substack.com

A collection of highlights from last year to celebrate this blog's one-year anniversary (BACK TO TOP)

In which ChatGPT and I invent a fictional language spoken by slime-people (BACK TO TOP)

A fanfiction written by GPTchat, with some guidance from me (BACK TO TOP)

https://rachelbythebay.com/w/

This one came in a request from a reader. They want to know my feelings about trying to "... avoid a company contributing to the downfall of humanity". This one's tough, particularly given my own history. I worked for a web hosting company that had a dubious history of keeping spammers around far too long. Then while I was there, they had the so-called "adware" vendor. They got mad if you called it "spyware". Now, that customer didn't last forever... Yeah, I actually said that. That whole thing. (BACK TO TOP)

Not all of my stories are long. I have plenty of shorter ones. ... Did you hear the one about the company that posted a bunch of videos to advertise something, and the backend screwed it up? Somehow, one of them got mixed up with someone else's video upload. They were trying to advertise a sports league. They got something else entirely. "... the video was switched to a dolphin swimming in a pool. Crosslinked videos? That's bad news. ... Someone put "zeus" in the root cause. ... ETA 30 minutes. (BACK TO TOP)

I used to work at a place that sold ads. One of the things this company wanted was for the employees to try it out and see what it was like to actually use the ads product themselves. It's the usual "dogfooding" thing you hear about sometimes. To that end, they issued a $250 credit every month. You just had to go to a certain internal web page and click a button, and it would credit it to your account. Every time the calendar rolled over to a new month, you could go click it again... It took 4.. (BACK TO TOP)

https://engineering.linkedin.com/blog.rss.html

Search functionality is a core part of most data-driven products, and is used widely at LinkedIn. We have long provided a central platform for search functionalities; however, it was not fully managed in the sense that the application teams needed to own and operate the corresponding resources. In this post, we will talk about Hosted Search, our new search solution that […] (BACK TO TOP)

We are constantly striving to improve the experience on LinkedIn for our members and customers, with research and experimentation, such as A/B Testing, playing a key role in that work. Nearly a decade ago, I discussed the importance of these techniques in our journey to create economic opportunity for every member of the global workforce. As our platform continues to grow and evolve, these techniques have become even more […] (BACK TO TOP)

Co-authors: Rohit Jamuar, Tianxin Zhou Introduction LinkedIn has a large set of physical servers geographically spread across several locations. Every application is hosted on a physical server and is distributed and managed across one of these hosts. With a reasonably sizable footprint of servers in data centers, LinkedIn is responsible for ensuring that these hosts are always on an operating system (OS) version deemed the “latest and greatest” for all intents and purposes. (BACK TO TOP)

http://jvns.ca/atom.xml

Hello! I’ve been working on a zine about debugging for the last 6 months with my friend Marie , and one of the problems we ran into was figuring out how to explain the right attitude to take when debugging. We ended up writing a short debugging manifesto to start the zine with, and I’m pretty happy with how it came out. Here it is as an image, and as text (with some extra explanations) 1. Inspect, don’t squash When you run into a bug, the natural instinct is to try to fix it as fast as possible. (BACK TO TOP)

Hello! I’ve been working on writing a zine about debugging for a while now (we’re getting close to finishing it!!!!), and one of the pages is about analyzing logs. I asked for some tips on Mastodon and got WAY more tips than could fit on the page, so I thought I’d write a quick blog post. search for the request’s ID Often log lines will include a request ID. So searching for the request ID of a failed reques will show all the log lines for that request..... (BACK TO TOP)

Hello! I’ve been doing Advent of Code in Rust for the past couple of days, because I’ve never really gotten comfortable with the language and I thought doing some Advent of Code problems might help. My solutions aren’t anything special, but because I’m trying to learn, I’ve been trying to take a slightly more rigorous approach than usual to compiler errors. Both of them are pretty basic Rust errors, but I had fun thinking about them today.iter().map(|(a, b)| { a + b }); println!("{}", scores.... (BACK TO TOP)

https://www.kubafilipowski.com/

Fakt, że komputer potrafi wygenerować koherentny tekst, który zawiera fakty, dobrze posługuje się językiem i konstruuje wypowiedzi, które brzmią autorytatywnie jest imponujące. Podobnie z generowaniem obrazów. W wielu przypadkach ich jakość jest tak wysoka , że trudno wyjść ze zdumienia, że autorem jest model AI. Jednak to nie jest jeszcze AGI . Brakuje ostatnich 10%, które sprawiają, że można na czymś polegać lub nie. Pisałem ostatnio o wyzwaniach w Stable Diffusion 2. W 2021 było to 8000 mil. (BACK TO TOP)

Wczoraj pisałem o sztucznej inteligencji, a dziś o organicznej głupocie. Zastanawiałem się czy o tym pisać bo to w sumie nie jest temat dotyczący technologii. Ale może trochę jest. W czasach “przed internetem” główne media tworzyły pewne spójne narracje, które każdy kto oglądał telewizję z rodziną znał. Dziś gdy każdy domownik ma swój telefon i sam dobiera sobie treści, spójna narracja nie występuje w tym samym stopniu co kiedyś. Na przykład smutny film o holokauście lub wojnie. Polecam. (BACK TO TOP)

Najgłupszą opinią przeciwko ChatGPT jest teza, że zabierze prace ludziom. Modele językowe są tak zaprojektowane by generowały tekst, który łatwo jest zrozumieć i przetworzyć człowiekowi. Mają też możliwości pisania kodu, który powstaje w odpowiedzi na żądanie napisane “ludzkim językiem”. Zamiast więc pisać językiem zrozumiałym dla maszyny, mogę poprosić maszynę ludzkim językiem, żeby napisała coś językiem maszyny. To absurd. Piła spalinowa zwiększa produktywność. ChatGPT robi to samo. (BACK TO TOP)

https://circleci.com/blog/

Earlier today, CircleCI CEO Jim Rose sent the following email to CircleCI employees. Hi all, Today, I am announcing some difficult news for our team. We are reducing our CircleCI workforce by 17% and parting ways with teammates we value and respect tremendously. It was very hard to make this decision, and I know that it will be even harder for those who are leaving our organization. These will be sent to your personal email. To those who are leaving CircleCI today, I am deeply sorry. (BACK TO TOP)

There are hundreds of capabilities on CircleCI that were designed to create the best possible CI/CD experience for our users. But one feature that users often point to as the most valuable on the platform is the CircleCI Insights dashboard. The Insights dashboard provides full visibility into metrics like job status, duration monitoring, and solutions for pipeline optimization. Insights dashboard core functions Take a closer look at the core functionality of the dashboard below. 1. 2. 3. 4. 5. (BACK TO TOP)

This tutorial covers: Setting up Pytest on a Flask app Writing Pytest tests Grouping tests Writing tests in any programming language can be difficult, but it does not have to be. In this tutorial, I will show you how you can easily write and run tests using Flask and Pytest. As a bonus, we will also integrate a CI/CD pipeline to run tests on a Flask app using CircleCI. If you don’t have a CircleCI account, sign up for a free one here .txt . The API application can be found in the api.data.data.. (BACK TO TOP)

https://packetpushers.net

On today's Day Two Cloud we continue our Kubernetes conversation with guest Michael Levan. Today's show focuses on Kubernetes deployments and managing clusters once they're up and running. We discuss whether Kubernetes is really more complex than traditional application infrastructure; examine management options such as GitOps, manifests, and Kubectl; share useful tools, and talk about why Kubernetes is all about APIs. (BACK TO TOP)

Today on the Tech Bytes podcast we explore two outages of big-time cloud applications with sponsor ThousandEyes, a Cisco company. These outages share a common thread, in that the network was up and the applications were reachable, but problems on the backend meant the applications weren’t available. We discuss what happened and offer takeaways to minimize business disruptions. The post Tech Bytes: Diagnosing SaaS Outages When It’s Not The Network (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news. The post Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices appeared first on Packet Pushers . (BACK TO TOP)

Today on Heavy Networking, modeling your network with Batfish. Batfish is an open-source project that builds a model of your production network based on a snapshot of your network and device configurations. Engineers can then test and validate changes against this model before making those changes to the production network. Guest Rick Donato walks us through how Batfish works, use cases, and more. (BACK TO TOP)

http://ai.googleblog.com/

Posted by Alexis Morvan and Trond Andersen, Research Scientists, Google Quantum AI When quantum computers were first proposed, they were hoped to be a way to better understand the quantum world. With a so-called “quantum simulator,” one could engineer a quantum computer to investigate how various quantum phenomena arise, including those that are intractable to simulate with a classical computer. But making a useful quantum simulator has been a challenge.e.e.e. Spectroscopy of bound states. (BACK TO TOP)

Posted by Krishna Giri Narra, Software Engineer, Google, and Chiyuan Zhang, Research Scientist, Google Research Ad technology providers widely use machine learning (ML) models to predict and present users with the most relevant ads, and to measure the effectiveness of those ads. With increasing focus on online privacy, there’s an opportunity to identify ML algorithms that have better privacy-utility trade-offs.S. Census .e., accuracy) with large computational overheads.e., 1 - AUC).e.g.e. (BACK TO TOP)

Posted by Malaya Jules, Program Manager, Google This week, the premier conference on Empirical Methods in Natural Language Processing (EMNLP 2022) is being held in Abu Dhabi, United Arab Emirates. We are proud to be a Diamond Sponsor of EMNLP 2022, with Google researchers contributing at all levels. This year we are presenting over 50 papers and are actively involved in 10 different workshops and tutorials. T. Alabi, Shamsuddeen H. Muhammad, Peter Nabende, Cheikh M. P. Zhao , Yi Luan , Keith B. (BACK TO TOP)

Posted by Katja Filippova, Research Scientist, and Sebastian Ebert, Software Engineer, Google Research, Brain team Modern machine learning models that learn to solve a task by going through many examples can achieve stellar performance when evaluated on a test set, but sometimes they are right for the “wrong” reasons: they make correct predictions but use information that appears irrelevant to the task. However, different methods can produce very different token rankings.e.00 Gradient x Input 0. (BACK TO TOP)

https://retool.com/blog/

Developers and teams up to 5 can use our free plan to build unlimited apps. Now that thousands of developers are using the plan, we're sharing what we've learned. (BACK TO TOP)

On the second day of Retool, some developers made for me - two tuple hacks and a parser for an AST! (BACK TO TOP)

On the first day of Retool, some hackers gave to me - a parser for an abstract syntax tree! (BACK TO TOP)

Internal apps are often complex and information dense. The new Sidebar frame is here to help. (BACK TO TOP)

http://simonwillison.net/

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

https://towardsdatascience.com

End Python Dependency Hell with pip-compile-multi Keep your project reproducible and your complex Python dependencies organized Photo by John Barkiple on  Unsplash Most Python projects of consequence have complex dependency management requirements that are inadequately addressed by common open-source solutions. Some tools try to tackle the entire packaging experience, while others aim to solve one or two narrow subproblems. The resulting dependency bloat can be a real issue.g.g.in).in.txt.in`. (BACK TO TOP)

Follow this right approach to write your SQL queries Continue reading on Towards Data Science » (BACK TO TOP)

How to code a custom LED light show using Raspberry Pi Continue reading on Towards Data Science » (BACK TO TOP)

Photo by Ross Sokolovski on  Unsplash A quick experiment at the intersection of Art and Science Introduction In this article, I describe a quick experiment that aims to quantify the associations among two seemingly orthogonal sets — basic shapes and primary colors—by using word embedding representations and cosine similarity to test Wassily Kandinsky’s theory of form and color.e. that can be found online as I am, and being genuinely intrigued by the question this exercise in particular posed (i. (BACK TO TOP)

Watch out for the biases in your AI systems: it’s sometimes a matter of life or death Continue reading on Towards Data Science » (BACK TO TOP)

https://changelog.com/master

Ivan Kwiatkowski joins Natalie once again for a follow-up episode to Hacking with Go: Part 2. This time we’ll get Ivan’s perspective on the way Go’s security features are designed and used, from the user/hacker perspective. And of course we will also talk about how AI fits into all this… (BACK TO TOP)

Narayanan Raghavan leads the global SRE organization that runs Red Hat managed cloud services including OpenShift Dedicated, Azure Red Hat Openshift, Red Hat OpenShift Service on AWS, and Red Hat OpenShift Data Science among others across the three major cloud providers: AWS, GCP & Azure. (BACK TO TOP)

In this special episode, we interview some of the sponsors and teams from a recent case competition organized by Purdue University, Microsoft, INFORMS, and SIL International. 170+ teams from across the US and Canada participated in the competition, which challenged students to create AI-driven systems to caption images in three languages (Thai, Kyrgyz, and Hausa). (BACK TO TOP)

Jonas Degrave builds a virtual machine inside ChatGPT, Advent of Code 2022 is in full swing, Mat Ryer impersonates Liam Neeson as web developer, Luca Hammer’s Fedifinder project helps you join the Fediverse & we chat with Brian (BDougie) Douglas about Open Sauced at All Things Open 2022. (BACK TO TOP)

This week we’re back at All Things Open 2022 covering the hallway track. Up first is Shivay Lamba and he’s schooling us on all things server-side WASM. It’s the new hotness. After that, we talk with Yishai Beeri, CTO of LinearB about the world of code review, PR queues, AI developers, and making human developers more efficient, and happier. And last, we talk with Guy Martin from NVIDIA about what’s going on in the Industrial Metaverse. (BACK TO TOP)

Thomas Steiner (Web Developer Advocate at Google) joins Amal & Nick to talk about Project Fugu – an effort to close gaps in the web’s capabilities enabling new classes of applications to run on the web. (BACK TO TOP)

https://pluralistic.net

Today's links One weird trick to make monopolies self-destruct: Remember when corporate raiders broke companies up? Hey look at this: Delights to delectate.net/2020/12/03/ministry-for-the-future/#ksr Robinson's book is important: it not only disproves the (variously attributed) capitalist realism aphorism that "it is easier to imagine the end of the world than it is to imagine the end of capitalism" – it also imagines the means by which that ending was brought about.prospectmagazine.co.co.co.ac. (BACK TO TOP)

Today's links EU to Facebook, 'Drop Dead': Ringing down the curtain on the consent theater. Hey look at this: Delights to delectate.eu/en/noyb-win-personalized-ads-facebook-instagram-and-whatsapp-declared-illegal In some ways, this is unsurprising. These uses have to be individually enumerated, and the user has to actively opt into giving up each piece of data and into each use of that data. The point of this exercise is to reveal consent theater for the sham it is. Har. Har. Har. https://www. (BACK TO TOP)

Today's links Raising money for Locus Magazine: Bid on naming rights for a character in one of my upcoming novels. Hey look at this: Delights to delectate. This day in history: 2002, 2007, 2012, 2017 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Raising money for Locus Magazine (permalink) Update: The naming rights/Tuckerization from this fundraiser sold almost immediately after this post went live, so we've added another one.indiegogo.npl. (BACK TO TOP)

Today's links Monopoly's event-horizon: The true capitalist singularity. Hey look at this: Delights to delectate. This day in history: 2012 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Monopoly's event-horizon (permalink) When a superdense, concentrated mass forms a black hole, the laws of physics around it change, giving rise to an eldritch zone where the normal rules don't apply. https://chokepointcapitalism. https://doctorow.medium.bbc. (BACK TO TOP)

Today's links The urinary tract infection business-model: Welcome to the self-destructing space-ship future. Hey look at this: Delights to delectate. I've always been baffled by the technologists who pursued control over liberation: surely their own formative experiences were of the liberatory power of technology. After experiencing that power, how could these Vichy nerds lend their skills to the project of forging digital shackles? https://pluralistic.reddit.medium.theverge.01/minute").eff.eff. (BACK TO TOP)

Today's links How tech changed global labor struggles for better and worse: Seize the means of computation! Hey look at this: Delights to delectate. This day in history: 2007, 2017, 2021. When it comes to technology's effect on our daily lives, the social arrangements matter much more than the feature-sets.net/2021/02/24/gwb-rumsfeld-monsters/#bossware And yet, what matters about bossware isn't what it does – a keylogger that you control is just called "undo" – but who it does it to.wired.eff. (BACK TO TOP)

https://stackoverflow.blog/

Everybody wants to learn more. But then sprints happen and you don't make time for it. The post How to make time for learning in tech appeared first on Stack Overflow Blog . (BACK TO TOP)

Announcing the latest addition to Collectives. The post AWS joins Collectives™ on Stack Overflow appeared first on Stack Overflow Blog . (BACK TO TOP)

Even nodes and validators need a backend built for speed. The post The blockchain tech to build in a crypto winter (Ep. 516) appeared first on Stack Overflow Blog . (BACK TO TOP)

Suddenly losing a job can be personally destabilizing. But lots of us have been there and gotten through it. The post Just laid off? Nervous about possible layoffs? Here’s what to do. appeared first on Stack Overflow Blog . (BACK TO TOP)

Developing in VR, bitcoin over Tor, and data structures in JS The post The Overflow #154: The state of the cloud in 2022  appeared first on Stack Overflow Blog . (BACK TO TOP)

Last one to leave turns off the microservices. The post Taking stock of crypto’s crash (Ep. 515) appeared first on Stack Overflow Blog . (BACK TO TOP)

https://fasterthanli.me/index.xml

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

https://www.amazon.science/

Test set includes 1,150 text segments, each in nine languages. (BACK TO TOP)

Sun and coauthors developed a novel way to understand and mine information networks that connect disparate entity types via different relations. (BACK TO TOP)

Learn about a real-time continual, lifelong learning system that trains machine learning models using production data at scale. (BACK TO TOP)

For maximum utility, says Miguel Ballesteros, large language models will need to generate coherent and consistent outputs and recognize prompts expressed in different ways. (BACK TO TOP)

Familiar topics like information extraction and question answering share space with robotics and geolocation learning, and query rewriting emerges as a dynamic area of research. (BACK TO TOP)

New language data will find immediate adoption by Barcelona Supercomputing Center. (BACK TO TOP)

Internal event designed to replicate external science conferences. (BACK TO TOP)

Accounting for data heterogeneity across edge devices enables more useful model updates, both locally and globally. (BACK TO TOP)

Learn about the development, operational, and process improvements that can be incorporated by organizations to improve the explainability of models while adhering to regulatory requirements. (BACK TO TOP)

Faculty projects are focused on various aspects of trustworthy machine learning. (BACK TO TOP)

https://cloud.google.com/blog/

Every day, teams across Google Cloud come together to help address complex and pressing compliance, risk, and privacy requirements that enable customers to accelerate their digital transformation and innovate faster. Let’s take a look at some of our top trust and compliance-related efforts from the last few months:  Combining data processing terms. The combined terms are now one Cloud Data Processing Addendum (the “CDPA”).K. Information Commissioner. Learn more in our updated whitepaper .S.S.S.. (BACK TO TOP)

When running Apache Hadoop and Spark, it is important to tune the configs, perform cluster planning, and right-size compute. Thorough benchmarking is required to make sure the utilization and performance are optimized. In Dataproc, you can run Spark jobs in a semi-long-running cluster or ephemeral Cloud Dataproc on Google Compute Engine (DPGCE) cluster or via Dataproc Serverless Spark. Dataproc Serverless for Spark runs a workload on an ephemeral cluster. PHS is nothing but a standalone cluster. (BACK TO TOP)

Today, we published a new Google research report on software supply chain security because we’ve seen a sharp rise in software supply chain attacks across almost every sector —and expect these trends to continue for the foreseeable future. We urge all organizations to act now to improve their software supply chain security. Among the report’s conclusions, there are two key findings we want to highlight. These frameworks can help organizations securely build and verify the integrity of software. (BACK TO TOP)

Did you know that most Google employees rely on virtual desktops to get their work done? This represents a paradigm shift in client computing at Google, and was especially critical during the pandemic and the remote work revolution. We’re excited to continue enabling our employees to be productive, anywhere ! This post covers the history of virtual desktops and details the numerous benefits Google has seen from their implementation. (BACK TO TOP)

Our quarterly Security Talks series brings together experts from Google Cloud security teams and the industry to share information on our latest security products, innovations and best practices. Below is the keynote address for our Security Talks on Dec. 7, 2022 , presented by MK Palmore, director, Office of the CISO at Google Cloud. GCAT’s clear and persistent focus is on the importance of cybersecurity in everything that we do. You can watch MK Palmore’s Security Talks keynote here . (BACK TO TOP)

If you want to create a Windows Server Virtual Machine (VM) in Compute Engine, it's as quick and easy as clicking a few buttons!  In this blog post, we’ll learn how to create a Windows Server VM in Compute Engine. If you want to follow along with this blog post, check out the documentation and in-console tutorial . Step 1 The first step is to create a new project; we will use an existing project called “ test-ctd ”. Starting first with the name, we’ll use the name testwindowsinstance .  (BACK TO TOP)

In today’s modern development world, a microservices-based architecture is a go-to pattern for developing applications that are independent, flexible, modular, and language-neutral, and offers significant agility benefits over a monolithic architecture. A great example of an organization that has made this transition is L.L.Bean , where its legacy on-premises system had been constraining the company's ability to be innovative and responsive. With this approach, L.L. (BACK TO TOP)

Editor's note : This post is part of an ongoing series on IT predictions from Google Cloud experts. Check out the full list of our predictions on how IT will change in the coming years. Prediction: AI will be the primary driver for moving to a 4-day work week Enterprise use of artificial intelligence (AI) has exploded over the past few years, touching all aspects of business. Merchandising and ecommerce teams are driving 40% more customer conversions with Recommendations AI. Read Article (BACK TO TOP)

The excitement at Next ‘22 this year was inescapable.  We celebrated a number of exciting announcements and wins that show where the cloud is heading, and what that means for our partners and customers.  As we close out 2022 and finalize our plans for 2023, I wanted to provide a perspective on the most important partner developments from the event to help you hit the ground running next year. Google Cloud’s transformation cloud was front and center throughout our entire event. 1... Read Article (BACK TO TOP)

If you’re familiar with the Medicare/Medicaid market, you’ve probably heard of the HEDIS score: the Health Effectiveness Data and Information Set. It’s a standard created by the National Committee for Quality Assurance ( NCQA ) and scores the quality of Medicare and Medicaid plans by measuring the effectiveness and utilization of plan benefits, access to care, and services delivered by providers. To say that it’s significant would be an understatement. 2. 3. (BACK TO TOP)

If you’re self-managing relational databases such as MySQL, PostgreSQL or SQL Server, you may be thinking about the pros and cons of cloud-based database services. Regardless of whether you’re running your databases on premises or in the cloud, self-managed databases can be inefficient and expensive, requiring significant effort around patching, hardware maintenance, backups, and tuning. More than 90% of the top 100 Google Cloud customers use Cloud SQL. More open. More intelligent... (BACK TO TOP)

While great strides have been made toward providing communities greater access to information technology, a digital accessibility gap still remains. In Los Angeles County, it is estimated that  416,000 households  lack home internet service and  265,000 households  are without a home computer. Beyond having broadband access, students - our next generation of workers - need to build digital literacy skills through exposure to emerging technology. Tech Empowerment Day was a tremendous success. (BACK TO TOP)

If you want to create a serverless service, you’ll want to check out Cloud Build .  Cloud Build is a popular Google Cloud service that allows you to execute your builds on Google Cloud. Cloud Build can import source code from various repositories or cloud storage spaces, execute a build to your specifications, and produce artifacts such as Docker containers or Java archives. Cloud Build is serverless, which means it scales up and down with no infrastructure to set up, upgrade, or scale.sh.  (BACK TO TOP)

Customers have been using BigQuery for their data warehousing needs since it was introduced. Many of these  customers routinely load very large data sets into their Enterprise Data Warehouse. Whether one is doing an initial data ingestion with hundreds of TB of data or incrementally loading from systems of record, performance of bulk inserts is key to quicker insights from the data. All the different file formats are converted into an optimized Columnar format called ‘Capacitor’ inside BigQuery. (BACK TO TOP)

Editor's note : This post is part of an ongoing series on IT predictions from Google Cloud experts. Check out the full list of our predictions on how IT will change in the coming years. Prediction: By 2025, 4 out of 5 enterprise developers will use some form of curated open source Open source is everywhere. It’s a public infrastructure that helps power our everyday life, helping to run everything from our electrical grids and water supplies to our oil pipelines. Read Article (BACK TO TOP)

Google Cloud is committed to serving public sector customers around the world, and has made significant progress in building products and services designed specifically to meet your needs. Today, Google Cloud is proud to announce Department of Defense Impact Level 5 (IL5) provisional authorization (PA) — another important milestone that enables us to support additional workloads for U.S. public sector customers.S.S. persons.S. persons from within the United States. The technology U.S.S. (BACK TO TOP)

Out of necessity, the life sciences industry has accelerated the innovation and experimentation of drug and device development. The sector, which has traditionally been slow-moving when it comes to clinical trials—for reasons ranging from regulatory, to trial recruitment, to quality control—is now looking towards cloud technology to speed up the process and find new innovative ways to support R&D. However, there are still a few obstacles to overcome. Complying with changing global regulations. (BACK TO TOP)

For far too long, managing employee expenses has been a time-consuming process that requires manual data entry and reconciliation to bridge the gap between business bank accounts and ERP systems. In the absence of an integrated workflow, finance teams use multiple systems to manage credit card and cash payments, and finding receipts. In most cases, they also lack real-time visibility into company spending. The complexity grows exponentially as businesses expand, especially into new regions. (BACK TO TOP)

Today, millions of users turn to Looker Studio for self-serve business intelligence (BI) to explore data, answer business questions, build visualizations and share insights in beautiful dashboards with others. Recently, we introduced enterprise capabilities, including the options to manage team content and gain access to enterprise support, with Looker Studio Pro . Plus, Google Cloud’s support and service level agreements ensure you have the help you need available when you need it... (BACK TO TOP)

This is a three-part series of posts, in which we summarize Workflows and service orchestration patterns. In this third and final post, we talk about managing workflow life cycles and the benefits of using Firestore with Workflows.  Use subworkflows and Terraform to manage workflow definitions If you’re not careful, the workflow definitions you create with YAML or JSON can get out of hand pretty quickly. Thankfully, there are other tools, such as Terraform, that can help. (BACK TO TOP)

Bulletin by Jakub Mikians