Bulletin for Friday, 22 Apr 2022
7 days digest
Almost Secure (1)
Computer Things (1)
Eugene Yan (1)
Go (Golang) Programming Blog - Ardan Labs on (1)
Metadata (1)
Mozilla Hacks – the Web developer blog (1)
Notes on software development (1)
Project Zero (1)
Stay SaaSy (1)
Stratechery by Ben Thompson (1)
Tech at Meta (1)
- Creative Spark: Meta teams with Girls Who Code, RCA Records, and Doja Cat to spur AR creation among young women
Future (2)
- Discover the anatomy of an external cyberattack surface with new RiskIQ report
- The future of compliance and data governance is here: Introducing Microsoft Purview
Retool Blog (2)
- How Retool upgraded our 4 TB main application PostgreSQL database
- Gotchas with Git and the GitHub API
Sentry Blog RSS (2)
- Sentry’s Android Gradle Plugin Updated with Room Support and More
- Troubleshooting Spring Boot applications with Sentry
- US Tax Day 2022. How leaving it to the last day impacts tax sites
- Breaking down broadband nutrition labels
Weaveworks (2)
- Accelerate your EKS Kubernetes operations with GitOps
- Profile Layering for Helm Encourages Self Service for Kubernetes
Google AI Blog (3)
- Hidden Interfaces for Ambient Computing
- FormNet: Beyond Sequential Modeling for Form-Based Document Understanding
- Learning to Prompt for Continual Learning
Pluralistic: Daily links from Cory Doctorow (3)
Earthly Blog (4)
- The Difference Between Docker and VMs
- Using Loops In Bash
- Earthly Switches to Open-source
- Building A Terminal User Interface With Golang
The CircleCI Blog Feed - CircleCI (4)
- Functional vs non-functional software testing
- Continuous integration for LoopBack APIs
- How we hired more engineers faster
- SAST vs DAST: what they are and when to use them
- TheWebConf: Stable themes, new wrinkles
- Amazon releases 51-language dataset for language understanding
- How does Astro localize itself in an ever-changing home?
- “Robin deals with a world where things are changing all around it”
- Xiuli Chao appointed Ralph Disney Collegiate Professor at UM
Blog – Hackaday (5)
- Car Hacker Hacks Lawn Care Carb Into Hot Rod Car
- Scanning Receipts Proves Trickier Than Anticipated
- 2022 Sci-Fi Contest: A Star Wars Mouse Droid Of Your Very Own
- The Honda Takedown: How A Global Brand Failed To Read The Room
- Watch a Complete Reflector Telescope Machined from a Single Block of Glass
- Instrumentation for gophers (Go Time #226)
- Improving an eCommerce fulfillment platform (Ship It! #49)
- 🌍 AI in Africa - Agriculture (Practical AI #175)
- The Oban Pro (Backstage #23)
- Postgres.js (JS Party #221)
- The robots are coming for (the boring parts of) your job
- New data: Do developers think Web3 will build a better internet?
- What’s the average tenure of an engineer at a big tech company? (Ep. 434)
- The Overflow #121: You should be reading academic computer science papers
- Warning signs that hot startup hiring engineers might not last (Ep. 433)
The Full Feed - All of the Packet Pushers Podcasts (5)
- IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab
- Day Two Cloud 143: Application Security Isn’t Just For Developers
- Network Break 378: Barracuda Gets A New Owner; Intel Buys Ananki For Private 5G
- Tech Bytes: Why Wi-Fi 6E Is Off To A Fast Start (Sponsored)
- Heavy Networking 626: Choosing The Right Silicon For The Job (Sponsored)
Towards Data Science - Medium (5)
- 3 types of data architecture components you should know about; applications, warehouses and lakes
- itertools and functools : Two Python Lone Soldiers.
- Best Practices for Visualizing Your Cluster Results
- Stop Using SMOTE to Treat Class Imbalance. Take This Intuitive Approach Instead
- Bayesian Customer Lifetime Values Modeling using PyMC3
Cloud Blog (20)
- Google Cloud launches new models for more accurate Speech AI
- Use cases enabled by Cloud-based maps styling
- Vaccinating a nation: Vaccination app delivery in 30 days with Cloud Spanner
- Meet the people of Google Cloud: Jim Hogan, driving innovation through inclusion
- Data visibility challenges? Manufacturer Spotlight '22 is coming May 5
- 24/7 Carbon-Free Energy: Powering up new clean energy projects across the globe
- Celebrating our tech and startup customers
- Build Voice AI into your apps with our top 3 Speech API codelabs
- Deutsche Börse Group achieves greater agility and scale with SAP on Google Cloud
- Google Cloud Partner Consumption Packs accelerate customer journeys to the cloud
- Nuuly does it: How technology is weaving sustainability into the future of retail
- 7 trends to watch in the API economy
- Doing our part: How Google’s network helps internet content reach users
- Climate scientist monitors Canada’s leaf canopy with Google Earth Engine on Google Cloud
- From insights to robots, Speech AI use cases have exploded
- Announcing Google Cloud 2022 Summits [frequently updated]
- 4 new ways Citrix & Google Cloud can simplify your Cloud Migration
- Our first-ever Google Workspace Summit: 9 sessions you don’t want to miss
- Extend your data to new uses with MongoDB and Apigee
- The SRE book turns 6!
Presence is a key feature of live apps and services to indicate availability and display a user's status. (BACK TO TOP)
It’s unclear whether all the countless people who have the Adobe Acrobat browser extension installed actually use it. The extension being installed automatically along with the Adobe Acrobat application, chances are that they don’t even know about it. But security-wise it doesn’t matter, an extension that’s installed and unused could still be exploited by malicious actors. So a few months ago I decided to take a look. To make this work smoother, Adobe Acrobat extension grants documentcloud.com . (BACK TO TOP)
Hi everyone, A brief note, I’ve written a book, and the content is nearly done. You can read all about it here. The first 90% of the project went well, but I need (well paid) help with the remaining 90% to turn it into a decent book. This is a ‘for profit’ book, but it will be given away for free to schools, universities and readers/students unable to afford it. So there is a bit of feel-good factor involved. (BACK TO TOP)
Onboarding and offboarding are some of the biggest operational challenges that face organizations today. When an employee switches teams, goes on leave, or exits, an admin typically deactivates them in their identity provider—and unfortunately, in 2022, that’s a recurring management burden. Access rules can include groups, which allow you to easily grant access to many users for the same resources, such as those on the same team or in the same role.com" , "bob@example. (BACK TO TOP)
https://buttondown.email/hillelwayne
I am really, really into cooking. In the heady days of 2016 I regularly threw dinner parties for 30+ people. These days I don’t hate myself that much, but it’s still a big part of my life. I know more about my city’s best grocery stores than its best restaurants and regularly bring homemade candy to conferences. I really like cooking. In order to cook well, you need to practice mise en place : prepping all your ingredients before you start cooking. That helped me work out the credential setup. (BACK TO TOP)
In practice, computer code is constantly being transformed. At the beginning of a project, the computer code often takes the form of sketches that are gradually refined. Later, the code can be optimized or corrected, sometimes for many years. Soon enough, programmers realized that they needed to not only to store files, but also to keep … Continue reading An overview of version control in programming (BACK TO TOP)
Introducing randomness and/or learning from inherent randomness to mitigate position bias. (BACK TO TOP)
https://www.ardanlabs.com/blog/
Introduction In the first two posts, I explained there were four aspects of a blockchain that this series would explore with a backing implementation provided by the Ardan blockchain project. (BACK TO TOP)
Recently, I got an email from someone asking about Stripe’s approach to product-led, developer-centric growth. If you really want a unique insight into Stripe, you’re undoubtedly better off reading Stripe’s 2021 update , but here are my general notes on Stripe as a microcosm of product-led, developer-centric growth. The Stripe of 2022 spans from SMB through enterprise, but early Stripe was highly focused on the startup segment of SMB.g.g.g.g. (BACK TO TOP)
Conti -- one of the most ruthless and successful Russian ransomware groups -- publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other healthcare facilities since first surfacing in 2018 under the name "Ryuk." (BACK TO TOP)
https://engineering.linkedin.com/blog.rss.html
Introduction Traditional IT processes supporting change management rely on a clear separation of the environments involved in the software development lifecycle (SDLC). Developments and Unit Tests are performed in the “Development” environments, Quality Assurance and User Tests are conducted in the User Acceptance Testing (UAT) environments, and the “Production” environment is the sacred place where only real-life transactions and activities are performed. (BACK TO TOP)
http://muratbuffalo.blogspot.com/
This VLDB'17 paper investigates the effects of distributed concurrency control protocols on performance of distributed transactional databases. They evaluate six protocols: two-phase locking with NO_WAIT and WAIT_DIE flavors, timestamp ordering (TIMESTAMP), multi-version concurrency control (MVCC), optimistic concurrency control (OCC), and a deterministic protocol Calvin. For the evaluations, they use an in-memory distributed database evaluation framework called Deneva ( https://github.e.g.5.6). (BACK TO TOP)
https://monzo.com/blog/technology
Our Mobile Platform team recently faced the challenge of having to remove all synthetic view properties. This post explains how we built a tool to automate the task and the trade-offs we had to consider along the way. (BACK TO TOP)
On March 1st, 2022, MDN Web Docs released a new design and a new brand identity. Overall, the community responded to the redesign enthusiastically and we received many positive messages and kudos. We also received valuable feedback on some of the things we didn’t get quite right, like the browser compatibility table changes as well as some accessibility and readability issues. The post Adopting users’ design feedback appeared first on Mozilla Hacks - the Web developer blog . (BACK TO TOP)
This is an external interview. Click here if you are not redirected. (BACK TO TOP)
https://www.tbray.org/ongoing/ongoing.atom
https://googleprojectzero.blogspot.com/
@import url('https://themes.googleusercontent.com/fonts/css?kit=lhDjYqiy3mZ0x6ROQEUoUw');.lst-kix_qhs0t3wlsx02-8>li{counter-increment:lst-ctn-kix_qhs0t3wlsx02-8}ol.lst-kix_h2vtkcla8l9d-2.start{counter-reset:lst-ctn-kix_h2vtkcla8l9d-2 0}ul.lst-kix_9i24fh2252ug-1{list-style-type:none}.lst-kix_h2vtkcla8l9d-3>li{counter-increment:lst-ctn-kix_h2vtkcla8l9d-3}ul.lst-kix_9i24fh2252ug-0{list-style-type:none}ul.lst-kix_9i24fh2252ug-3{list-style-type:none}ul.lst-kix_9i24fh2252ug-2{list-style-type:none}ul. (BACK TO TOP)
I was in the park with my son and his best friend. I saw 2 missed calls from a number I didn’t recognise. I Googled it - it was my bank. I told the other adults that I should call back in case it was important. This was mistake number 1. Nothing the bank might want to talk about could be urgent enough to interrupt an unseasonably sunny March afternoon. I got through to the bank, but they couldn’t work out why they had called me. I made a note to check my account when I got home. “No”, I said. (BACK TO TOP)
As a product manager, it’s important to hone the minimum set of activities that allow you to keep a product line moving forward productively. One of the most important core product management skills: the ability to triage unsuccessful products and avoid spending unnecessary effort on products that are destined to be losers. A few common ways that this can happen: Your CEO demands that you build a feature that they’re confident will help you win your market. Everything you build should add value. (BACK TO TOP)
Twitter should go private and return to its pre-2012 approach of being a centralized service with third-party clients. (BACK TO TOP)
Creative Spark: Meta teams with Girls Who Code, RCA Records, and Doja Cat to spur AR creation among young women
Today, we’re excited to announce our collaboration with Girls Who Code, RCA Records and Doja Cat to teach girls the fundamentals of creating for augmented reality (AR) and to show them the future prospects that exist within the AR tech industry. As the first step in this initiative, Girls Who Code selected five young women […] The post Creative Spark: Meta teams with Girls Who Code, RCA Records, and Doja Cat to spur AR creation among young women appeared first on Tech at Meta . (BACK TO TOP)
https://www.hackerfactor.com/blog/
I first started developing forensic tools to track spammers. Back then (circa 1998), there were various spam filters available, but not many tools for evaluating spam itself. I ended up building tools that checked the email headers, looked for common templates, identified mailing patterns, and more. This is also how I found covert channels hidden in spam. Habitual and lifestyle patterns are often identifiable. The carding group called themselves "The Dutch Mafia"...99 $989.00 Direct"...99".com.. (BACK TO TOP)
https://blog.pragmaticengineer.com/
I've been running The Pragmatic Engineer Job board for several months. This is a job board targeted at software engineers and engineering managers. It's one of the few job boards with a money-back guarantee in case of no qualified applicants: and I've issued 4 This is a content summary only. Click on the blog title to continue reading this post and browse The Pragmatic Engineer blog. (BACK TO TOP)
https://geohot.github.io//blog/
Here’s a simple way to take over Twitter for way less than $43 billion dollars. For reference, this is a vampire attack , perhaps best popularized by SushiSwap. The creators on Twitter are the liquidity providers, the lurkers are the users. It’s hard to create a new platform because you need both to move at once. Here’s a simple way to solve that. Step 1: Make a clone of Twitter on a blockchain, TWITCHAIN, with a native currency of TWITCOIN. Make the UI clean and responsive. (BACK TO TOP)
I've been using my Raspberry Pis for some data collection purposes, and noticed some of them doing a few things which seemed suboptimal. There's this process called "rngd" which really likes to wake up every so often and announce stuff about what it's been up to. It's usually about every hour, and it tends to push a dozen lines to the syslog, none of which I care about. Per the manual: Controls the interval in which statistics are output to syslog.g. I was pretty happy.000101> [ .......... So... (BACK TO TOP)
American biotech has traditionally been a centralized industry, with most companies clustered in a handful of cities and operating with teams of in-house scientists. When biotech first gained its footing in the 1980s, there were good reasons for its centralized structure, including geographic proximity to the universities supplying talent and intellectual property. But recent changes... Read More The post A Guide to Decentralized Biotech appeared first on Future . (BACK TO TOP)
This is an excerpt from Zero to IPO: Over $1 Trillion of Actionable Advice from the World’s Most Successful Entrepreneurs by Frederic Kerrest, pp. 164-171, (McGraw Hill, April 2022). Kerrest co-founded Okta – an enterprise identity management company – in 2009 and currently serves as its executive vice chairperson and chief operating officer. I’ve heard a lot... Read More The post Managing Your Mental Health While Running a Startup appeared first on Future . (BACK TO TOP)
https://www.microsoft.com/security/blog
Learn how supply chains, shadow IT, and other factors are growing the external attack surface—and where you need to defend your enterprise. The post Discover the anatomy of an external cyberattack surface with new RiskIQ report appeared first on Microsoft Security Blog . (BACK TO TOP)
Hybrid work has connected us in ways unimaginable just two years ago. Today we routinely communicate across continents while collaborating in real-time. Protecting a decentralized hybrid work environment requires strong solutions built around clear principles designed to defend customers’ data, safeguard employees, and protect the business. The post The future of compliance and data governance is here: Introducing Microsoft Purview appeared first on Microsoft Security Blog . (BACK TO TOP)
Last fall, we migrated our 4TB Postgres database from version 9.6 to version 13 with minimal downtime. In this post, we’ll tell the story and share tips to help you with a similar upgrade. (BACK TO TOP)
While building the Source Control feature in Retool, we hit a few gotchas working with the GitHub API, in particular with Git trees and API limits. We share those lessons in this post. (BACK TO TOP)
Monitoring performance is a critical part of software development. We just released version 3.0.0 of our Sentry Android Gradle plugin, which… (BACK TO TOP)
In this article, we walk through improvements we've made to the development experience in our Java SDK with several features for error reporting and performance monitoring, with a dedicated integration for Spring MVC. (BACK TO TOP)
How tax related websites were impacted by the Tax Day 2022 (the April 18 deadline to fill federal and state taxes)? With the highest growth in April (BACK TO TOP)
We commend Congress for including broadband nutrition labels in the Infrastructure Investment and Jobs Act, and the FCC for moving quickly to implement the labels (BACK TO TOP)
Well architected for hybrid environments at scale AWS Well Architected Framework is a fantastic resource for organizations modernizing their infrastructure in the cloud. The body of knowledge offers solid and well rounded advice across critical pillars that must be grasped in-depth by teams building and operating cloud native solutions; Especially when considering building developer platforms on top of Kubernetes. (BACK TO TOP)
Written By Darryl Weaver, Solution Architect at Weaveworks David Stauffer, Product Manager at Weaveworks Kubernetes is the de facto cloud-native platform for applications and operational teams. Provisioning fully functional Kubernetes clusters is still a challenge, however, as they require more than just their bare-bone skeleton. The reason we created profiles was, in short, ease of use. The definition of the profile itself is done through tooling that is already widely adopted.e. (BACK TO TOP)
Posted by Alex Olwal, Research Scientist, Google Augmented Reality and Artem Dementyev, Hardware Engineer, Google Research As consumer electronics and internet-connected appliances are becoming more common, homes are beginning to embrace various types of connected devices that offer functionality like music control, voice assistance, and home automation. Illustration of how hidden interfaces can appear and disappear in everyday surfaces, such as a mirror or the wood paneling of a home appliance. (BACK TO TOP)
Posted by Chen-Yu Lee and Chun-Liang Li, Research Scientists, Google Research, Cloud AI Team Form-based document understanding is a growing research topic because of its practical potential for automatically converting unstructured text data into structured information to gain insight about a document’s contents. However, form documents often have more complex layouts that contain structured objects, such as tables, columns, and text blocks.e., semantic entity extraction).e.g.5x smaller. (BACK TO TOP)
Posted by Zifeng Wang, Student Researcher, and Zizhao Zhang, Software Engineer, Google Research Supervised learning is a common approach to machine learning (ML) in which the model is trained using data that is labeled appropriately for the task at hand. Ordinary supervised learning trains on independent and identically distributed (IID) data, where all training examples are sampled from a fixed set of classes, and the model has access to these examples throughout the entire training phase.e.g. (BACK TO TOP)
Today's links Undetectable backdoors for machine learning models: Classifiers considered harmful. Hey look at this: Delights to delectate. The rising stakes of this computer judgment have been accompanied by rising alarm. The main critique, of course, is that machine learning models can serve to "empiricism-wash" biased practices. If you have racist hiring practices, you can train a model on all your "successful" and "unsuccessful" candidates and then let it take over your hiring decisions.cs. (BACK TO TOP)
Today's links Podcasting "Big Tech Isn’t Stealing News Publishers’ Content": "…It's stealing their money." Hey look at this: Delights to delectate. https://doctorow.medium.com/big-tech-isnt-stealing-news-publishers-content-a97306884a6b Countries all over the world – France, Australia, Brazil and now Canada (Bill C-11)- have fallen in love with the idea that the answer to the news media's woes is to create a new licensable copyright over "snippets" of news that users post to social media.ftc.org. (BACK TO TOP)
Today's links Ryan North's 'How to Take Over the World': Popular science as a series of supervillainous thought-experiments. This day in history: 2002, 2007, 2012, 2017, 2021 Colophon: Recent publications, upcoming/recent appearances, current writing projects, current reading Ryan North's 'How to Take Over the World' (permalink) There's a certain kind of Internet Person who makes the world a better place every day, just by showing up.qwantz.kickstarter. http://machineofdeath." http://blog.panix. (BACK TO TOP)
Docker and similar containerization technologies have taken the tech world by storm. They have largely displaced virtual machines (VMs) as the de facto segmentation methodology for servers and software developer workflows. However, it’s important to note that Docker containers and VMs do not make for an apples-to-apples comparison. One is not inherently better than the other, with each having its pros and cons and use cases that might be better suited to one than the other.dev . Earthly. (BACK TO TOP)
Like any other programming language, Bash supports loops. The loops are used to repeatedly execute a set of commands based on some condition. Along with conditionals , they’re the most common way to control the flow of a program. Once you’ve mastered variables and conditionals, you’re ready to learn loops. In this article, you’ll learn the different types of loops provided by Bash and see some examples of using them to accomplish various tasks. You can think of it as an inverted while loop...... (BACK TO TOP)
TLDR We are switching from a source-available license, to an open-source license for Earthly. We started Earthly with the mission of bringing better builds to the world and to become the standard CI/CD framework that allows pipeline development locally and running on any CI. Oftentimes, to be able to deliver on a mission, you also need a way to sustain that mission long-term. For us this meant raising capital from investors and building a sustainable business around it.0 .e. ↩︎ (BACK TO TOP)
Did you know it’s actually possible to build a rich UI that runs completely in the terminal? Programs like htop and tmux use a terminal user interface (TUI) because they are often run on servers that don’t have access to a GUI. Many developer tools also a TUI since developers spend so much time in the terminal anyway. There are even a number of games that run entirely in the terminal. In this article we’ll use the Go programing language to create our own TUI. Basically a terminal based rolodex.. (BACK TO TOP)
When you think of software testing, what comes up first? For many developers, unit tests and integration tests are often top of mind. Both software testing methods are vital to writing and maintaining a high-quality production codebase. But they are not sufficient on their own. Your team’s testing practice should assess the entire application, observe the larger story of how it operates when functioning correctly, and raise alarms when deviations are found. Unit tests are limited though. (BACK TO TOP)
This tutorial covers: Getting started with LoopBack Creating a question model and a datasource Automating tests for the LoopBack API endpoints The explosion of talent available for remote work (and the widespread acceptance of remote first employment) allows for global collaboration on an unprecedented scale. This does not come without risks - especially in the software industry. Failure to do so can result in unexpected downtime and loss. LoopBack is a highly extensible Node.js version 8.9.0.0. (BACK TO TOP)
About a year ago, our engineering organization realized it had a problem. CircleCI was in hyper-growth mode and needed to hire more engineers… and we needed to do it fast. But our current process was taking far too long. We knew the process could be improved, we just had to figure out how. So, as we often do at CircleCI, we began experimenting. When we still weren’t finding the right talent fast enough, we iterated on our process again and again. Ask about the skills needed to do the job. (BACK TO TOP)
As digital transformation accelerates and more organizations use software solutions to facilitate work operations, security threats have become more commonplace. Cybercriminals tirelessly develop ways to exploit software application vulnerabilities to target organizational networks. A notable example is the 2017 Equifax data breach , which exposed the personal details of 145 million Americans. It does not check for security flaws leading to data breaches. SAST is open box testing. SAST vs. (BACK TO TOP)
Amazon Scholar Eugene Agichtein on incorporating knowledge into natural-language-processing models, multimodal interactions, and more. (BACK TO TOP)
MASSIVE dataset and Massively Multilingual NLU (MMNLU-22) competition and workshop will help researchers scale natural-language-understanding technology to every language on Earth. (BACK TO TOP)
Deep learning to produce invariant representations, estimations of sensor reliability, and efficient map representations all contribute to Astro’s superior spatial intelligence. (BACK TO TOP)
An advanced perception system, that detects and learns from its own mistakes, enables Robin robots to select individual objects from jumbled packages — at production scale. (BACK TO TOP)
Professorship named after influential former University of Michigan professor. (BACK TO TOP)
Internal combustion engines have often been described (quite correctly) as air pumps, and because of this nature, they tend to respond very well to more air. Why? Because more air …read more (BACK TO TOP)
It’s one of those things that certainly sounds simple enough: take a picture of a receipt, run it through optical character recognition (OCR), and send the resulting information to whatever …read more (BACK TO TOP)
The show-stealing droids of Star Wars, R2-D2 and C-3PO, are quite challenging to replicate at home, due to their size and complexity. [curiousmarc] had built the former, with much work going …read more (BACK TO TOP)
Perhaps the story of the moment in the world of 3D printing concerns a Japanese manufacturer of cars and motorcycles. Honda has sent a takedown notice requesting the removal of …read more (BACK TO TOP)
If this is the easy part of making a complete reflector telescope from a single piece of glass, we can’t wait to get a load of the hard part! A …read more (BACK TO TOP)
Björn Rabenstein & Bartlomiej Płotka join Mat & Johnny to discuss observability, monitoring and instrumentation for gophers. (BACK TO TOP)
Alex Sims, a Senior Software Engineer at James & James, an eCommerce fulfilment company, reached out to us about the Kaizen story of the third-party logistics (3PL) platform that he has been involved with for several years now. The system delivered 16 millions of orders in 10 years, and 4.5 million in the last year alone. All the numbers are going up, and there is only so much that a single PHP monolith deployed as VM images can handle. (BACK TO TOP)
In the fourth “AI in Africa” spotlight episode, we welcome Leonida Mutuku and Godliver Owomugisha, two experts in applying advanced technology in agriculture. We had a great discussion about ending poverty, hunger, and inequality in Africa via AI innovation. The discussion touches on open data, relevant models, ethics, and more. (BACK TO TOP)
We’ve been using Parker Selbert’s Oban library for years and he even helped us hold it right by improving our open source implementation! So, Jerod invited him Backstage to discuss the library, how we’re using it, Parker’s plan to make it financially sustainable, his “freedom number” of Oban Pro subscribers, and a bunch of other random stuff along the way. Let’s go! (BACK TO TOP)
Rasmus Porsager created Postgres.js –the fastest full-featured PostgreSQL client for Node.js and Deno. Today he joins Jerod for a deep-dive on Postgres, why he created this open source library, and how you can use it to build pg-backed JavaScript applications. (BACK TO TOP)
Are the robots coming for your job? You’ve heard this question before. But in 2022, with AI increasingly ubiquitous in the lives of most coders, the issue feels more pressing. The post The robots are coming for (the boring parts of) your job appeared first on Stack Overflow Blog . (BACK TO TOP)
Are blockchain and Web3 the future or are they just a fad? We asked the developer community about Web3, blockchain, crypto, and whether they are all hype or truly the future of the internet. The post New data: Do developers think Web3 will build a better internet? appeared first on Stack Overflow Blog . (BACK TO TOP)
While many devs see landing a FAANG job as a major achievement, the data shows many don't stay long after joining. The post What’s the average tenure of an engineer at a big tech company? (Ep. 434) appeared first on Stack Overflow Blog . (BACK TO TOP)
This week: why you should be reading academic computer science papers, Go vs. C in embedded applications, and the security risks of “protestware.” The post The Overflow #121: You should be reading academic computer science papers appeared first on Stack Overflow Blog . (BACK TO TOP)
Ben and Cassidy compare notes on Plex.tv, the rapid collapse of Fast.co, and why rigorous adherence to personal security protocols can make the FBI suspicious. The post Warning signs that hot startup hiring engineers might not last (Ep. 433) appeared first on Stack Overflow Blog . (BACK TO TOP)
In this episode of IPv6 Buzz we talk about what a Proof of Concept (PoC) lab is and why you probably need one as part of your IPv6 initiative. We discuss technical challenges and considerations, how much of your production network you need to model, learning opportunities that come with a lab, and more. The post IPv6 Buzz 099: Why You Need An IPv6 Proof Of Concept Lab appeared first on Packet Pushers . (BACK TO TOP)
Today's Day Two Cloud gets into application security and working with developers to make sure code is sanitized and tested. Writing secure code at the outset can dramatically reduce risk and help simplify operations and security. Our guest is Tanya Janca, founder of We Hack Purple. We Hack Purple offers free training courses for people who want to get into security. The post Day Two Cloud 143: Application Security Isn’t Just For Developers appeared first on Packet Pushers . (BACK TO TOP)
Take a Network Break! This week we cover several acquisitions including Barracuda Networks being bought by KKR, SailPoint being picked up by Thoma Bravo, Perforce buying Puppet, and Intel snapping up Ananki to get into the private 5G market. Plus more tech news. The post Network Break 378: Barracuda Gets A New Owner; Intel Buys Ananki For Private 5G appeared first on Packet Pushers . (BACK TO TOP)
Today on Tech Bytes podcast we talk with Aruba, a Hewlett Packard Enterprise company, about the evolution of Wi-Fi standards, why Aruba is seeing the fast take-up of Wi-Fi 6E, practical enhancements in 6E, and what to expect with Wi-Fi 7. The post Tech Bytes: Why Wi-Fi 6E Is Off To A Fast Start (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)
Today's Heavy Networking, sponsored by Juniper, dives into the custom vs. merchant silicon debate. Juniper makes the case for its Trio 6 ASIC in MX routers. We get into the specifics of Trio 6 capabilities, examine the needs of the multi-service edge, and discuss the technology and business cases for custom hardware. The post Heavy Networking 626: Choosing The Right Silicon For The Job (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)
https://towardsdatascience.com
3 Types of Data Architecture Components You Should Know About: Applications, Warehouses and Lakes What’s the difference, and why does it matter? Photo by Pietro De Grandi on Unsplash When I was starting out in the world of analytics, data architecture was pretty intimidating. The terms were alien to me, people would throw terms around like ‘ETL’, and ‘data lake’, I’d nod along having only a vague sense of what they were talking about and put it in the ‘too difficult’ box.50 on 19th April at 5. (BACK TO TOP)
One cool thing about Python is its support for functional programming which states that processing steps are done through functions. Continue reading on Towards Data Science » (BACK TO TOP)
Proven techniques for cluster visualization and interpretation Continue reading on Towards Data Science » (BACK TO TOP)
Let’s expose the myth; SMOTE doesn’t deserve the hype. This simple approach does! Continue reading on Towards Data Science » (BACK TO TOP)
Continue reading on Towards Data Science » (BACK TO TOP)
https://cloud.google.com/blog/
With voice continuing to emerge as the new frontier in human-computer interaction, many enterprises may seek to level up their technology and present consumers with speech recognition systems that more reliably and accurately recognize what their users are saying. Think about it: higher speech recognition quality can enable people to talk to their applications and devices the way they would talk to their friends, their doctors, or other people they interact with.6 million times. Read Article (BACK TO TOP)
Last November, we launched Cloud-based maps styling to enable simpler, faster map creation and deployment with no coding. You can use over 250 points of customization to tailor your maps and create richer user experiences, drive deeper user engagement and elevate your brand. It also saves developer time and resources needed to create, deploy, and test different map implementations. For more information on Google Maps Platform, visit our website . (BACK TO TOP)
As the most specialized provider of cloud computing solutions in Poland, Chmura Krajowa (OChK) works to accelerate the digital transformation of Polish businesses and public institutions. In November 2020, the Polish government handed us a formidable challenge: starting from scratch and within 30 days, design and deploy an application to help vaccinate every citizen in Poland against COVID-19. One for call centers where live operators could schedule appointments for callers. Read Article (BACK TO TOP)
Editor’s note : Jim Hogan is both the Principal Innovation Strategist at Google Cloud, and the VP of Accessibility in Technology for Google's Disability Alliance. Being autistic, he's faced severe challenges in finding belonging in the workplace. This experience fires his passion for workplace equity on many fronts. It also informs his technical work of aligning corporate aspirations to the realities of software architecture. What was your path to Google? In a word, hard. Hear more from Jim . (BACK TO TOP)
At Google Cloud, our mission is to accelerate manufacturers' digital transformation by bridging data silos, and turning every engineer into a data scientist with easy-to-use AI technologies and an industry data platform. Our customers and partners have made great progress on their data transformation journey and on May 5th they will share their perspective and insights at the Manufacturer Spotlight . Every factory has unique challenges and optimization needs. Read Article (BACK TO TOP)
Back in 2010, Google signed its first-ever agreement to purchase 114 MW of wind power in Iowa. This deal made us an early pioneer of corporate power purchase agreements (PPAs) — contracts to purchase renewable energy directly from developers on the same grids where we operate our data centers. Signing PPAs is a critical first step, but typically these deals are signed before a project breaks ground. What’s really exciting is when those deals start producing clean energy to the grid. (BACK TO TOP)
Our tech and startup customers are disrupting industries, driving innovation and changing how people do things. We’re proud of their success and want to showcase what they’re up to! You’ll hear about their new products, their businesses reaching new milestones and their ability to get things done faster and easier using Google Cloud’s app development, data analytics and AI/ML services. Read more about their Series C funding round. Read more . Find out more . Read more . Watch video . (BACK TO TOP)
With voice-controlled touchpoints becoming more and more the norm in human-computer interactions, our Speech-to-Text (STT) API is a great option for developers looking to build voice into their applications. The API processes over 1 billion spoken minutes of speech each month, enough to transcribe all Presidential inauguration speeches in U.S. history over 1 million times.cloud import speech_v1 as speech\r\n\r\n\r\ndef speech_to_text(config, audio):\r\n client = speech. 2. 3. Read Article (BACK TO TOP)
Digitization is heavily transforming the Financial Services Industry. All players are facing the challenge of reacting to new trends while also having the possibility to actively shape them. Moreover, companies like Deutsche Börse Group are operating in a strictly regulated environment. As an international market infrastructure and exchange organization, we are covering the entire value chain from pre-trade to trade and post-trade processes. Scalability was another area where demands were high. (BACK TO TOP)
When we launched Partner Advantage, we committed to making it predictable and easy for partners to drive business with us. Since launch, those commitments have been validated by channel experts like CRN, which gave Partner Advantage a 5-Star award for 2022 , and by the fact that our partners have seen impressive growth * across virtually every facet of their business. Packages have pre-determined funding levels to enable faster deployments. See you in the cloud. Read Article (BACK TO TOP)
They say black never goes out of style. It’s something the team at Nuuly, URBN’s digital rental and resale business , know well. And it’s not just true of the company’s garments but their gadgets, too. “I was having an offhand conversation with a UX designer recently,” Rebecca Sandercock, Nuuly’s strategy and insights manager, recalled in a recent interview from the company’s sunny, South Philly headquarters . Yet there are even more subtle yet substantial benefits.” Dr.5 times. Read Article (BACK TO TOP)
Organizations across every industry are aiming to achieve digital transformation initiatives to stay competitive, which increasingly include overcoming the complexity of hybrid and multicloud environments. With resources stretched and margins getting thinner, application programming interfaces (APIs) and the API economy will continue to play a critical role in connecting services, applications, and clouds. 1. API security takes center stage. 2. Microservices APIs are gaining speed. 3. 4. 5.S. (BACK TO TOP)
Every video shared, every email sent and app downloaded depends on data traffic that moves through international network infrastructure. How is this content magically available to people within milliseconds? It’s thanks to a rich ecosystem of companies and local providers who build global infrastructure that provides businesses and people around the world with the best possible experience for browsing, video conferencing, streaming, and much more. (BACK TO TOP)
Climate scientists face a deluge of environmental data to analyze and interpret from real-time sensors and satellites across the globe. The stakes are as high as our planet’s long-term future, but rapidly changing conditions are already impacting communities through extreme events like floods and wildfires as well as management of everyday resources. In this context, detailed environmental maps are key sources for urgent global issues like food security, water quality, and vegetation levels. Dr. (BACK TO TOP)
It’s been five years since we launched the Google Cloud Speech-to-Text (STT) API , and we’re awed by the things our customers have done. From powering voice-controlled apps to generating captions for videos, the API processes more than 1 billion minutes of spoken language each month—enough to transcribe the entirety of the Oxford English Dictionary more than half a million times (including obsolete words), assuming normal speaking speeds. “We have a 96% retention rate.” “I’m data driven. (BACK TO TOP)
Register for our 2022 Google Cloud Summit series , and be among the first to learn about new solutions across data, machine learning, collaboration, security, sustainability, and more. You’ll hear from experts, explore customer perspectives, engage with interactive demos, and gain valuable insights to help you accelerate your business transformation. Bookmark the Google Cloud Summit series website to easily find updates as news develops. Collaboration today is about more than where you work. (BACK TO TOP)
Citrix and Google Cloud empower organizations to securely deliver the apps and data people need to be as productive as possible — across a wide range of work locations and device types. Now, our growing partnership has something new to offer: a secure, flexible, and cost-effective desktop-as-a-service (DaaS) that scales up and down both quickly and intuitively. Given that 90 percent of organizations are planning to adopt hybrid work this year, the timing couldn’t be better. 1. 2. 3. 4.Google.20. (BACK TO TOP)
We’re just a few weeks away from our first-ever Google Workspace Summit (May 4, 2022), where you can discover how organizations of all sizes are building productive, secure, and flexible environments for the evolving future of work. Hear from global brands, internationally recognized security experts, Google executives, and technology partners about how they’re transforming the way people work and collaborate—from the frontlines to the back office and everywhere in between. 1. 2. 3. 4. 5. 6. (BACK TO TOP)
In many organizations, crucial enterprise data is locked in dozens or hundreds of silos that may be controlled by different teams and stuck in systems that no longer serve business needs. This type of data infrastructure complexity is a blocker for innovation and insights, and ultimately hampers the business’s ability to move forward. For example, imagine building a new mobile app for your customers that enables them to view their account data in a single view.js, C#/. (BACK TO TOP)
It's hard to believe that it's already been six years since we published Site Reliability Engineering: How Google Runs Production Systems with O'Reilly Media. We've been both humbled and pleasantly surprised by how popular the book has been, and continues to be. You may already be familiar with the two related books Google published after the SRE Book became a bestseller: The Site Reliability Workbook and Building Secure and Reliable Systems . All three books are available for free at sre... (BACK TO TOP)
Bulletin by Jakub Mikians