Skip to content

Latest commit

 

History

History
1464 lines (694 loc) · 83.6 KB

bulletin-2022-08-19.md

File metadata and controls

1464 lines (694 loc) · 83.6 KB

Bulletin for Friday, 19 Aug 2022

7 days digest


Engineering at Meta (1)


Stay SaaSy (1)


ongoing by Tim Bray (1)


Think Fast, Talk Smart: Communication Techniques (1)


Metadata (1)


The Teleport Blog (1)


Stratechery by Ben Thompson (1)


Almost Secure (1)


Eugene Yan (1)


Blog - Bitfield Consulting (1)


Vallified (1)


Blog on Tailscale (1)


Timescale Blog (2)


Weaveworks (2)


Computer Things (2)


Retool blog (2)


Google AI Blog (2)


Blog – Hackaday (2)


The Cloudflare Blog (2)


PlanetScale - Blog (3)


Future (3)


Microsoft Security Blog (3)


LogicAI website (3)


Krebs on Security (3)


Pluralistic: Daily links from Cory Doctorow (4)


Sentry Blog RSS (4)


Simon Willison's Weblog: Blogmarks (4)


Towards Data Science - Medium (5)


The CircleCI Blog Feed - CircleCI (5)


Amazon Science Homepage (5)


Stack Overflow Blog (5)


Changelog Master Feed (6)


The Full Feed - All of the Packet Pushers Podcasts (7)


Cloud Blog (19)


https://engineering.fb.com/

Designing a constrained exploration system [...] Read More... The post How Instagram suggests new content appeared first on Engineering at Meta . (BACK TO TOP)

https://staysaasy.com/

Many people want to advance in their careers. It’s natural to seek career progression and the increased compensation and autonomy that typically come with it (although of course it’s also more than fine to remain in a role that you enjoy for the long term). This post runs through some of the most important dimensions for being a senior leader that I personally aim for, and that I look for when promoting or hiring senior management. Your team needs to be self-scaling and self-replicating. (BACK TO TOP)

https://www.tbray.org/ongoing/ongoing.atom

(BACK TO TOP)

https://www.gsb.stanford.edu/insights/think-fast-talk-smart-podcast

“We need to be much more adaptive in the way we think about hybrid work,” says Michael Arena. “Experiment, experiment, experiment.” Innovation relies on teams connecting in very specific ways. In this episode of Think Fast, Talk Smart , they discuss how teams can optimize their communications to keep innovating in a post-pandemic world. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info . (BACK TO TOP)

http://muratbuffalo.blogspot.com/

This paper (Sigmod 2013) gives an overview of the design of the Hekaton engine which is optimized for memory resident data and OLTP workloads and is fully integrated into Microsoft SQL Server. The paper starts with a strongly opinionated paragraph: SQL Server and other major database management systems were designed assuming that main memory is expensive and data resides on disk. I really like this paper. The paper is self-contained and is easy to follow. It is very well written.g.8X.3X.7X. (BACK TO TOP)

https://goteleport.com/blog/

Reviewing how Teleport extends BeyondCorp and federal zero trust architecture (ZTA). (BACK TO TOP)

https://stratechery.com

Trends in medium, AI, and user interaction underpin Instagram's response to TikTok, and will determine Meta's long-term moat. (BACK TO TOP)

https://palant.info/

As we’ve seen in the previous article , a browser extension isn’t very different from a website. It’s all the same HTML pages and JavaScript code. The code executes in the browser’s regular sandbox. So what can websites possibly gain by exploiting vulnerabilities in a browser extension? Well, access to extension privileges of course. Browser extensions usually have lots of those, typically explicitly defined in the permissions entry of the extension manifest, but some are granted implicitly.g.g. (BACK TO TOP)

https://eugeneyan.com

Pushing back on the cult of complexity. (BACK TO TOP)

https://bitfieldconsulting.com/blog/

Pop quiz, hotshot. How much does it cost to build a self-hosted Kubernetes cluster? Quick, no conferring. If you thought the answer was “nothing”, go to the back of the class. (BACK TO TOP)

https://www.philipotoole.com

Star Trek has inspired huge numbers of people to become scientists, engineers, and programmers. I’m one of them. It often inspired me to work hard, build quality systems, and never give up when looking for the root cause of a tricky bug. When all you do as a kid is watch Star Trek, you get … Continue reading Star Trek made me a bad Engineering Manager → The post Star Trek made me a bad Engineering Manager appeared first on Vallified . (BACK TO TOP)

https://tailscale.com/blog/

When you’re working in an environment with strict compliance needs, you want to make sure you’re following the principle of least privilege and granting employees access only to the resources they need to do their job. Tailscale ACLs already make that possible by letting you define what someone can access — and restricting their access to everything else — with “default deny” rules . That’s where Opal comes in. Add the Tailscale app to Opal following the documentation . (BACK TO TOP)

https://www.timescale.com/blog/

Need tips to optimize your ingest rate? An essential for those dealing with high amounts of data, this is the kickoff theme of our Timescale Cloud Tip series—a bunch of short, tutorial-style posts in which we’ll share our advice on how to make the most of your cloud database. (BACK TO TOP)

Read (and watch!) how Density is using IoT and TimescaleDB to solve a pressing problem, especially after the pandemic: how can companies with vast square footage optimize their space usage based on data-driven decisions? (BACK TO TOP)

https://www.weave.works/

Port forwarding is the practice of directing data traffic from the outside world to access a device or network within your private system. In other words, it facilitates a service in a private network to connect with other public or private network services or systems. One classic example of port forwarding is the automated telephony system, IVR (Interactive Voice Response). In this case, you are an outside system attempting to access a customer service agent within an organization. (BACK TO TOP)

Cloud-native technologies have introduced ground-breaking advancements in accelerating software launches. On the flip side, they have widened the surface area for cyber attacks. Cloud misconfigurations are estimated to account for over 99% of breaches by 2025, according to Gartner . We have already witnessed some of the biggest attacks that have affected untold numbers of organizations over the last couple of years. Solarwinds is likely the most notable example. These policies are hosted in Git. (BACK TO TOP)

https://buttondown.email/hillelwayne

There were a couple of threads this week on why Test Driven Development, or TDD, isn’t more widely used by programmers. I spoze the historic and ongoing inability/unwillingness of the software trade to grasp and adopt test-driven development (TDD) is one of the most frustrating & demoralizing events of my forty-two years as a professional geek. I have a different explanation: TDD isn’t as valuable as its strongest proponents believe. I defended it back in 2018 and would defend it now.  ↩ (BACK TO TOP)

Surprise newsletter! I said there was none this week due to vacation, but that ended Monday and I’m forever cursed by a witch, so People might remember this quote from last month’s newsletter : Interactive computation is a common enough activity for me that I’d put a lot of time into learning something like this. …Maybe I should just get real good with Excel. Instead of sprinkling A15 and B1:D94 in your code, you can just… give the cells and ranges names. Yes, really. It’s useful. (BACK TO TOP)

https://retool.com/blog/

Retool Mobile is the fast way to build production-grade native apps for mobile teams—without any mobile experience required. Join the beta waitlist today! (BACK TO TOP)

We’re introducing a new option to store data for your Retool apps: a Retool-hosted SQL database—complete with a spreadsheet interface to update the schema and manage your data. Retool Database is now in private beta for all cloud customers. To get started, join our beta waitlist today. (BACK TO TOP)

http://ai.googleblog.com/

Posted by Yutian Chen, Staff Research Scientist, DeepMind, and Xingyou (Richard) Song, Research Scientist, Google Research, Brain Team One of the most important aspects in machine learning is hyperparameter optimization , as finding the right hyperparameters for a machine learning task can make or break a model’s performance. Internally, we regularly use Google Vizier as the default platform for hyperparameter optimization.e., tuning specifications).g.g. Left : Rosenblatt Goodness-of-Fit .g. (BACK TO TOP)

Posted by Brian Ichter and Karol Hausman, Research Scientists, Google Research, Brain Team Over the last several years, we have seen significant progress in applying machine learning to robotics. However, robotic systems today are capable of executing only very short, hard-coded commands , such as “Pick up an apple,” because they tend to perform best with clear tasks and rewards. We are also excited to release a robot simulation setup where the research community can test this approach.e.e.g. (BACK TO TOP)

https://hackaday.com

In the old days, it wasn’t uncommon to put an AM radio near a computer or a monitor and deliberately cause interference to have a crude form of sound generation. …read more (BACK TO TOP)

If you’ve ever tried to drill a hole on an angle with a power drill, you’ve probably drilled some pretty shocking holes. To do it right, you really need some …read more (BACK TO TOP)

https://blog.cloudflare.com/

The Cloudflare Support team has launched a new Support Portal. The portal will give you access to self-help resources, diagnostics with troubleshooting guides, and will provide for easier ticket submission (BACK TO TOP)

Cloudflare is uniquely positioned to help give crawlers hints about when they should recrawl, if new content has been added, or if content on a site has recently changed (BACK TO TOP)

https://planetscale.com

You can now use PlanetScale in HTTP-only environments, like Cloudflare Workers, Vercel Edge Functions, and Netlify Edge Functions Read the full story (BACK TO TOP)

Introducing FastPage, a new gem for ActiveRecord that speeds up deep pagination queries. Read the full story (BACK TO TOP)

Learn how PlanetScale uses a custom middleware to disable our Sidekiq jobs in production without replying on deploys. Read the full story (BACK TO TOP)

https://future.com/

Want to create an image of velociraptors working on a skyscraper, in the style of “Lunch Atop A Skyscraper” of 1932? Use DALL-E. Want to create an imaginary standup comedy show by Peter Thiel, Elon Musk, and Larry Page? Use GPT-3. Want to deeply understand COVID-19 research and answer your questions based on evidence? Learn... Read More The post How to Build a GPT-3 for Science appeared first on Future . (BACK TO TOP)

This is an excerpt from Build for Tomorrow by Jason Feifer (Harmony Books, September 2022). Amy Orben wanted to answer a very modern question: How do digital connections compare with other forms of connection?  It’s the kind of thing only a wonky, hyperanalytic person would think to ask. Orben is that person. She received a... Read More The post How to Break the Cycle of Technology Panics appeared first on Future . (BACK TO TOP)

Who are you when you’re online? This question is all the more important as we spend more and more of our lives there. In the past decade, online usage has more than doubled; for GenZ, it’s even greater. How we spend that time has also changed as the early, transactional web has expanded to a... Read More The post Unbundling Digital Identity Unlocks New Ways to Play and Build appeared first on Future . (BACK TO TOP)

https://www.microsoft.com/security/blog/

To provide advanced protection against increasingly complex and evasive cryptojackers, Microsoft Defender Antivirus integrates with Intel® Threat Detection Technology (TDT) that applies machine learning to low-level CPU telemetry in detecting cryptojackers, even when the malware is obfuscated and can evade security tools. The post Hardware-based threat defense against increasingly complex cryptojackers appeared first on Microsoft Security Blog . (BACK TO TOP)

Microsoft speakers at Gartner Identity & Access Management Summit focus on permissions management, infrastructure attacks, and moving to cloud-based identity. The post Connect with Microsoft Security experts at the 2022 Gartner Identity & Access Management Summit appeared first on Microsoft Security Blog . (BACK TO TOP)

The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM in campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft. The post Disrupting SEABORGIUM’s ongoing phishing operations appeared first on Microsoft Security Blog . (BACK TO TOP)

http://logicai.io/blog/

Nature never goes out of style! The Kaggle Days Meetup in San Francisco has raised the bar again. Five continents, twelve events, one grand finale, and a community of more than 10 million - that's Kaggle Days, a nonprofit event for data science enthusiasts and Kagglers. Beginning in November 2021, hundreds of participants attending each meetup face a daunting task to be on the podium and win one of three invitations to the finals in Barcelona and prizes from Kaggle Days and Z by HPZ by HP. (BACK TO TOP)

Now you are playing with power! "It was amazing," commented attendees of the third Kaggle Days X Z by HP World Championship meetup, and we fully agree. The Moscow event brought together as many as 280 data science enthusiasts in one place to take on the challenge and compete for three spots in the grand finale of Kaggle Days in Barcelona. Of course, we already know the winning teams that best handled the contest task. As always, at Kaggle Days, a lot was going on. So let's experience it again." (BACK TO TOP)

Introduction "Happy to be part of shaping the future." "It's the Way of The Future." That is how the participants summed up another meetup organized as part of Kaggle Days, a non-profit event for data science enthusiasts who want to grow and compete for prizes under the watchful eye of top Kaggle mentors and grandmasters. The second meetup in New Delhi is behind us. Each Kaggle Days meetup addresses current issues and challenges facing people and the planet. Knowing that some 2. Here they are. (BACK TO TOP)

https://krebsonsecurity.com

Scammers are using invoices sent through PayPal.com to trick recipients into calling a number to dispute a pending charge. The missives -- which come from Paypal.com and include a link at Paypal.com that displays an invoice for the supposed transaction -- state that the user's account is about to be charged hundreds of dollars. (BACK TO TOP)

Earlier this month, the administrator of the cybercrime forum Breached received a cease-and-desist letter from a cybersecurity firm. The missive alleged that an auction on the site for data stolen from 10 million customers of Mexico’s second-largest bank was fake news and harming the bank’s reputation. The administrator responded to this empty threat by purchasing the stolen banking data and leaking it on the forum for everyone to download. (BACK TO TOP)

The Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System -- a national public warning system used to deliver important emergency information, such as severe weather and AMBER alerts. (BACK TO TOP)

https://pluralistic.net

Today's links Kickstarting the "Chokepoint Capitalism" audiobook: We wrote a book that Amazon won't sell. Hey look at this: Delights to delectate. This day in history: 2012, 2017, 2021. http://www.beacon.org/Chokepoint-Capitalism-P1856.aspx Ironically, the very phenomenon this book describes – "chokepoint capitalism" – is endemic to book publishing, and in audiobook publishing, it's in its terminal phase.kickstarter. That's a huge deal. Holy shit, did it ever work.kickstarter." https://www.vice. (BACK TO TOP)

Today's links How Democrats could win more elections: Do stuff. Make it timely. Tell people about it. Hey look at this: Delights to delectate. If Democrats want to win more elections, they should try: Enacting popular policies, preferably ones that materially improve the lives of potential voters; Making sure those policies take effect before the next election; and Telling people about them. I know, I know. But you guys, I think I could really be onto something. Take Social Security.house.cato. (BACK TO TOP)

Today's links This weekend, I watched a hacker jailbreak a John Deere tractor live on stage: Total pwnage, with a a side of copyfraud. Hey look at this: Delights to delectate. Deere's claims have included the astounding statement that the farmers who spend hundreds of thousands of dollars on tractors don't actually own those tractors, because the software that animates them is only licensed, not sold: https://memex.craphound.medium.vice.wired.5GB worth of data once he brought it online.medium. (BACK TO TOP)

Today's links The FTC takes aim at commercial surveillance: Oh, the sheer poetry of "Commercial Surveillance and Data Security Rulemaking." Hey look at this: Delights to delectate." Bizarrely, it's a fallacy that is widely held by both government snoops and Big Tech snoops. But I don't want my money going to Google – those bastards would sell their mothers out for a nickle." Meanwhile, in Silicon Valley, I hear, "I don't care if Google has my data – they just want to show me better ads.medium. (BACK TO TOP)

https://blog.sentry.io

In 2018 we launched the Sentry Unity SDK, but at the time, we couldn’t crack how to display stack trace line numbers for C# exceptions with… (BACK TO TOP)

Debugging in Unity Debugging is a frequently performed task not just for general software developers but also for game developers. During a… (BACK TO TOP)

In the last 2 parts of this series around improving performance in your Django applications, we focused on database and code optimizations… (BACK TO TOP)

I’m an engineer during the day and a founder at night – so I don’t have time to fiddle with complicated instrumentation or bugs that are hard to track down. That’s why I picked the tech stack that I did. (BACK TO TOP)

http://simonwillison.net/

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

(BACK TO TOP)

https://towardsdatascience.com

SQL is easy to learn and can be used in various business applications. It is a powerful language used for data analysis in business. With… Continue reading on Towards Data Science » (BACK TO TOP)

Implement these easy error handling steps to strengthen your scripts Continue reading on Towards Data Science » (BACK TO TOP)

How explainable machine learning can be applied for pattern recognition in breast cancer research Photo by Tara Winstead from  Pexels Over the past few years, there has been a lot of hype around how machine learning will transform many industries. One industry mentioned frequently is health care. In the following blog post, we will explore a type of impact that can be made. We will do this by examining an article that was published in the journal Nature in 2021. Available from: https://www. (BACK TO TOP)

Review of the algorithm for automatic anchor selection in YOLOv5 and YOLOv7 Original Image modified by Author Some Convolutional Neural Networks, including later versions of YOLO, rely on anchors. So before starting to train your network, you need to decide what anchors you will use and make this decision based on the data you have. Anchor set is like a constant you pass to the model, like a prior that incorporates the nature of object sizes in the dataset. See the visualization below. Step 2. (BACK TO TOP)

Part 2: Risk Analysis Continue reading on Towards Data Science » (BACK TO TOP)

https://circleci.com/blog/

The CircleCI visual config editor (VCE) is now generally available as an open source project. Development teams can now create and modify CircleCI config files in a visual drag-and-drop, low-code environment. The VCE is a node-graph editor that you can use to modify CircleCI config elements and generate config files. It provides a frictionless way to build CI/CD pipelines and interact with CircleCI’s platform in an efficient, user-friendly visual interface.js . Since Node. The file package.1.9. (BACK TO TOP)

This tutorial covers: Creating a new AWS CDK application Adding a Lambda authorizer and defining CDK constructs Automating and testing the deployment of the CDK stack This is the second tutorial in a two-part series. You can also learn how to automate AWS Lambda function deployments to AWS CDK . AWS Cloud Development Kit (AWS CDK) is an open-source framework that allows you to use the programming language of your choice to define and deploy your cloud resources. Create a package.1.0.0.3.config.. (BACK TO TOP)

This tutorial covers: Building a FeathersJS API Writing code and tests for a FeathersJS app Creating a CI pipeline to automate testing This is one of a two-part series. You can also learn how to automate the deployment of FeathersJS apps to Heroku . In the software development lifecycle, testing offers benefits that reach far beyond the code itself. By highlighting any regressions that are introduced, testing also provides the confidence to make adjustments and improvements to the code.0..yml .. (BACK TO TOP)

Testing is a vital part of the mobile app development process. Your team can use testing to evaluate the quality, security, and reliability of mobile apps before releasing them to your users. Users who expect their applications to be highly performant and intuitive. There are two ways DevOps teams can perform testing for mobile apps: on-premise (also called self-hosted) or in the cloud. You must also monitor the machines and execute software upgrades. (BACK TO TOP)

This tutorial covers: Defining your AWS CDK application and the AWS Lambda handler Manually building and deploying your CDK application Automating the deployments This is the first tutorial in a two-part series. You can also learn how to use AWS CDK to automatically deploy REST APIs with Lambda authorizers . When you build a cloud-based application, you can choose to deploy the resources using the GUI (Graphical User Interface) or CLI (Command Line Interface) provided by the cloud provider.js.1. (BACK TO TOP)

https://www.amazon.science/

CAV keynote lecture by the director of applied science for AWS Identity explains how AWS is making the power of automated reasoning available to all customers. (BACK TO TOP)

In tests, new approach is 15 to 18 times as fast as predecessors. (BACK TO TOP)

ARA recipient is using artificial intelligence to help doctors make decisions based on radiological data. (BACK TO TOP)

Data augmentation and post-editing strategies lift Amazon’s submission above competitors. (BACK TO TOP)

Li and co-authors honored for creating an antenna design that was essential to the growth of mobile devices. (BACK TO TOP)

https://stackoverflow.blog

Since the day a hiring manager first wheeled a whiteboard into a conference room, software engineers have dreaded the technical interview, which can be an all-day process (or multi-day homework assignment). If you’re interviewing for multiple roles, you can expect to write out a bubble sort in pseudocode for each one. These technical interviews do… The post The last technical interview you’ll ever take (Ep. 474) appeared first on Stack Overflow Blog . (BACK TO TOP)

The home team is joined by Heather Meeker, a specialist with a deep history in the world of open-source software licensing. The post A history of open-source licensing from a lawyer who helped blaze the trail (Ep. 473) appeared first on Stack Overflow Blog . (BACK TO TOP)

Readable code is great, but not all code will be immediately readable. That's when you get your interrogation tools. The post How to interrogate unfamiliar code appeared first on Stack Overflow Blog . (BACK TO TOP)

Monitoring data quality, telling your boss about overtime, and Docusaurus 2 The post The Overflow #138: Social learning for engineers appeared first on Stack Overflow Blog . (BACK TO TOP)

Spencer Kimball, cofounder and CEO of Cockroach Labs and co-creator of the GIMP image editor, tells Ryan and Ceora about how database technology has evolved to handle massive data volumes, how Cockroach labs came to focus on solving latency issues through serverless technology, and his “relatively gentle” transition from engineer to CEO. The post A conversation with Spencer Kimball, creator of GIMP and CockroachDB (Ep. 472) appeared first on Stack Overflow Blog . (BACK TO TOP)

https://changelog.com/master

In this episode, we will be exploring PRs. What makes a good PR? How do you give the best PR review? Is there such thing as too small, or big of a PR? We’ll be debating the details, and trying to help our fellow gophers perfect the art of the PR. We are joined by three wonderful guests Jeff Hernandez, Sarah Duncan, and Natasha Dykes. Hosted by Angelica Hill & Natalie Pistunovich. (BACK TO TOP)

Why are the right values important for a company that changed the way the world builds software? How does pair programming help scale & maintain the company culture? What is it like to grow a company to 3000 employees over 30 years? Today we have the privilege of Rob Mee, former CEO of Pivotal, the real home of Cloud Foundry and Concourse CI. Rob is now the CEO of Geometer.io, an incubator where Elixir is behind many great ideas executed well, including the US COVID response programme. (BACK TO TOP)

Daniel and Chris cover the AI news of the day in this wide-ranging discussion. They start with Truss from Baseten while addressing how to categorize AI infrastructure and tools. Then they move on to transformers (again!), and somehow arrive at an AI pilot model from CMU that can navigate crowded airspace (much to Chris’s delight). (BACK TO TOP)

Lucas F. Costa on why your daily stand-ups don’t work and host to fix them, Mahdi Yusuf deeply explains Redis, the Deno team announces some big changes coming, DevDash is a highly configurable terminal dashboard for developers and creators & Brett Cannon determines what is a Minimum Viable Python (MVPy). (BACK TO TOP)

eBPF is a revolutionary kernel technology that has lit the cloud native world on fire. If you’re going to have one person explain the excitement, that person would be Liz Rice. Liz is the COSO at Isovalent, creators of the open source Cilium project and pioneers of eBPF tech. On this episode Liz tells Jerod all about the power of eBPF, where it came from, what kind of new applications its enabling, and who is building the next generation of networking, security, and observability tools with it. (BACK TO TOP)

Astro 1.0 just dropped so Amal got its creator, Fred K. Schott, on the pod for the full rundown. They go deep on how Astro is built to pull content from anywhere and serve it fast with their next-gen island architecture. (BACK TO TOP)

https://packetpushers.net

Learning Kubernetes isn't easy. In fact, there are so many places to start that people literally don’t know where to begin. Do they learn Kubernetes security? Networking? Infrastructure? Development? Michael Levan catches up with Kevin Evans and Robin Smorenburg to talk about their journeys into Kubernetes, how each of them started, links to learning resources, and where they’re at now. The post Kubernetes Unpacked 007: Kubernetes From Beginner To Advanced appeared first on Packet Pushers . (BACK TO TOP)

DevOps originated as a cultural movement to try and get developers and infrastructure operators to better work together to support applications in production. According to our guest Lee Briggs, that movement has failed. We discuss this premise on today's Day Two Cloud podcast. The post Day Two Cloud 159: DevOps Is A Failure appeared first on Packet Pushers . (BACK TO TOP)

On today’s Tech Bytes podcast, we talk Data Processing Units (DPUs) with sponsor NVIDIA. The context is VMware’s Project Monterey. Wes Kennedy, TME for BlueField at NVIDIA, is here to discuss how NVIDIA is partnering with VMware to enable offloads of applications such as NSX and VSAN. The post Tech Bytes: NVIDIA BlueField And Project Monterey (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

Today's Full Stack Journey podcast explores the barriers to network automation that individuals and organizations face. We also discuss how network engineers can overcome the inertia of just getting started, skills development tips, and more. Our guests are Matt Oswalt and Christian Adell. The post Full Stack Journey 069: Network Automation Challenges For Engineers And Organizations appeared first on Packet Pushers . (BACK TO TOP)

Today on the Tech Bytes podcast we talk about managing cloud risk with sponsor Fortinet. Fortinet recently announced its new FortiCNP product, which collects and correlates security findings, alerts and other data from cloud-native services, analyzes vulnerabilities, looks for misconfigurations, and more. The post Tech Bytes: Manage Cloud Risks With Fortinet’s New FortiCNP Offering (Sponsored) appeared first on Packet Pushers . (BACK TO TOP)

This week's Network Break podcast covers tech news including IP Infusion's 6.0 release of its OcNOS network OS, the intersection of politics and supply chains, Cisco's breach by the Lapsus group, Starlink getting rejected by the FCC for subsidies, and more. The post Network Break 394: New IP Infusion NOS, Cisco Breached, WLAN Gear Backlogged To 2023 appeared first on Packet Pushers . (BACK TO TOP)

Single pair Ethernet. That’s right. Ethernet over a single twisted pair, rather than the four you’re used to. Or two if you’ve got a little gray in your beard. Now, single pair Ethernet isn’t fast in the way we network engineers would normally think of fast. SPE runs at 10 megabits per second. But in the use cases SPE was designed for, 10Mbps is very fast indeed. To tell us all about single pair Ethernet is Peter Jones. (BACK TO TOP)

https://cloud.google.com/blog/

Why are so many companies moving to the cloud? One reason we hear quite often is cost reduction. The elasticity of cloud services, or its ability to scale up or down as needed, means paying only for what you use. Right up there on the list of reasons is security. This is because developing in the cloud enables greater visibility and governance over your deployment's resources and data. Constantly tuning your deployment can quickly become tedious work due to the sheer magnitude of options.   (BACK TO TOP)

From electrifying transportation to shifting the grid to renewable energy, environmental sustainability is one of the greatest challenges of our generation. A critical but often forgotten goal is the development of sustainable agricultural practices, especially given increasing water shortages and soil degradation around the world. Lucent Bio was born to solve some of these threats to humanity’s ability to feed itself. This year, we’re poised to take the next big step to 20,000 kg per day. (BACK TO TOP)

Over the years, the default marker, represented by the red pin has become an iconic part of the Google Maps experience, and as the pin has evolved, we’ve brought those same changes to Google Maps Platform. Now, we’re bringing the newest version of the pin to the Maps JavaScript API and the Maps SDKs for Android and iOS. Starting next week, the new pin will roll out across all surfaces as the default marker. Custom marker implementations in your apps will not be affected.30. (BACK TO TOP)

Over the past few years, Google has observed that distributed denial-of-service (DDoS) attacks are increasing in frequency and growing in size exponentially . Today’s internet-facing workloads are at constant risk of attack with impacts ranging from degraded performance and user experience for legitimate users, to increased operating and hosting costs, to full unavailability of mission critical workloads. Figure 1: DDoS attack graph peaking at 46M requests per second.m.m. Read Article (BACK TO TOP)

Editor’s note : Since joining Google in 2007, Carrie Bell has gone from working on search ads to managing multiple teams of highly skilled engineers. That may seem unusual, but she says there’s a common theme across it all: empowerment. What was your path to Google? I joined the Army Reserve out of high school, and after a year of training, began attending Marquette University as an English major. That was interrupted by the decision to invade Iraq, where I then spent a year. It's a huge deal. (BACK TO TOP)

Optimizing your costs is a major priority for Google Cloud. We do this with products that deliver a great combination of price and performance, recommendations that help you right size your deployment, and by offering the right pricing models. Committed Use Discounts is one such model that allows you to get high discounts against commitments to use for a defined period. CUDs are a very effective way of saving on your cloud costs when you have some predictability in your workloads. (BACK TO TOP)

Every student and educator deserves access to learning tools that are private and secure. Google Workspace for Education and Chromebooks have positively transformed teaching and learning, while creating safe learning environments for more than 170 million students and educators around the world. Our education products are built with data protection at their core, enabling school administrators to demonstrate their privacy compliance when using our services. 1. 2. 3. Read Article (BACK TO TOP)

Editor’s note : Kaluza is a UK-based technology company that provides energy retailers with real-time billing, smart grid services, and seamless customer experiences. In this blog, Tom Mallett, Sustainability Manager, Kaluza, explains how Kaluza leverages Google Cloud to improve energy visibility throughout the company. He also explores how better emissions data informs sustainability solutions that make the world’s energy greener, smarter, and more reliable. And that’s only the half of it. (BACK TO TOP)

Business leaders and IT professionals come to Google Workspace to build secure, cloud-first collaboration solutions that transform how people work together. Here’s the latest from Google Workspace leaders and partners about the evolving future of work and collaboration, all in one place. Empowering everyday innovation to build a more adaptive business Hear from Google Workspace VP of Engineering, Philip Brittan, about how organizations can rethink their approach to innovation . Read more . (BACK TO TOP)

In this article we'll explore the networking components of Google Kubernetes Engine (GKE) and the various options that exist. Kubernetes is an open source platform for managing containerized workloads and services and GKE is a fully managed environment for running Kubernetes on Google Cloud infrastructure.  IP addressing Various network components in Kubernetes utilize IP addresses and ports to communicate. IP addresses are unique addresses that identify various components in the network.g. (BACK TO TOP)

A critical component of any security operations team’s job is to deliver high-fidelity detections of potential threats across the breadth of adversary tactics. But increasingly sophisticated threat actors, an expanding attack surface, and an ever-present cybersecurity talent shortage make this task more challenging than ever.  Google keeps more people safe online than anyone else.  Today, we are putting the power of Google’s intelligence in the hands of security operations teams... Read Article (BACK TO TOP)

Diagnosing and treating chronic pain can be complex, difficult, and full of uncertainties for a patient and their treating physician. Depending on the condition of the patient and the knowledge of the physician, making the correct diagnosis takes time, and experimenting with different treatments might be required.  This trial-and-error process can leave the patient in a world of pain and confusion until the best remedies can be prescribed. Let’s dig into this VEX example from CycloneDX . (BACK TO TOP)

Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more.  Tip : Not sure where to find what you’re looking for on the Google Cloud blog? Start here:  Google Cloud blog 101: Full list of topics, links, and resources . Week of Aug 15 - Aug 19, 2022 Cloud SQL now supports deletion protection for MySQL, Postgres and SQL Server instances. No ETL required. Learn more . (BACK TO TOP)

Innovation is often associated with big wins: increasing a competitive advantage, developing a new product, or disrupting a category. But these outcomes are almost always enabled by advancements that occur on a smaller scale—in the ways organizations regularly carve out time for creative thinking, experiment with processes, and deploy technology to collaborate. Viewing innovation as a daily practice also reminds us that it’s not a lightning strike. When employees feel heard, they are “ 3." EY. (BACK TO TOP)

If you’re new to Security Talks, you should know that this program is part of an ongoing series where we bring together experts from the Google Cloud security team, including the Google Cybersecurity Action Team and Office of the CISO, and the greater industry to share information on our latest security products, innovations, and best practices.  The Q3 installment of the Google Cloud Security Talks  on Aug. 31 is a special show-and-tell edition.   We’re looking forward to seeing you there. (BACK TO TOP)

Interested in becoming Google Cloud certified? Wondering which Google Cloud certification is right for you? We’ve got you covered. Check out the latest #GCPSketchnote illustration , a framework to help you determine which Google Cloud certification is best suited to validate your current skill set and propel you toward future cloud career goals. Where will your certification journey take you? Get started preparing for your certification today. Read Article (BACK TO TOP)

The data received at serving time is rarely in the format your model expects. Numerical columns need to be normalized, features created, image bytes decoded, input values validated. Transforming the data can be as important as the prediction itself. That’s why we’re excited to announce custom prediction routines on Vertex AI, which simplify the process of writing pre and post processing code. You can see an example here  showing how to build a model server with FastAPI.cloud.aiplatform.cloud. (BACK TO TOP)

“Ninety percent of all data today was created in the last two years—that’s 2.5 quintillion bytes of data per day,” according to business data analytics company Domo . That would be a mind-bending statistic, except that it’s already five years old.  As data usage has undergone drastic expansion and changes in the past five years, so have your business needs for data. Technology such as cloud computing and AI have changed how we use data, derive value from data, and glean insights from data... (BACK TO TOP)

Are you looking to migrate a large amount of Hive ACID tables to BigQuery?  ACID enabled Hive tables support transactions that accept updates and delete DML operations. In this blog, we will explore migrating Hive ACID tables to BigQuery. The approach explored in this blog works for both compacted (major / minor) and non-compacted Hive tables. Let’s first understand the term ACID and how it works in Hive. Underlying the Hive ACID table, files are in the ORC ACID version.apache.hadoop.hive.ql.io. (BACK TO TOP)

Bulletin by Jakub Mikians