Links

Friday 2024-11-01 Assorted Links
Assorted Links links
Published: 2024-11-01
Friday 2024-11-01 Assorted Links

Assorted links for Friday, November 1:

  1. AI Flame Graphs
  2. OpenZFS deduplication is good now and you shouldn’t use it
  3. Apache OpenDAL: Open Data Access Layer: Access data freely
  4. Embeddings are underrated

    Embeddings aren’t exactly new, but they have become much more widely accessible in the last couple years. What embeddings offer to technical writers is the ability to discover connections between texts at previously impossible scales.

  5. How To Fail at Microservices
Thursday 2024-10-31 Assorted Links
Assorted Links links
Published: 2024-10-31
Thursday 2024-10-31 Assorted Links

Assorted links for Thursday, October 31:

  1. The Future of APIs: Lessons in Security, Composability, AI
  2. How Apollo Makes LLMs More Reliable with GraphQL

    GraphQL’s structured query language proves to be an ideal match for AI tools, offering more reliable and focused results compared to broader LLM applications.

  3. How useful is the hint passed to the std::unordered_… collections?: An unsorted followup on Speeding up the insertion of a sorted (or mostly-sorted) key list into a std::map or other ordered associative container
  4. What is a Vector Database & How Does it Work? Use Cases + Examples
  5. What is Retrieval-Augmented Generation (RAG)?
Wednesday 2024-10-30 Assorted Links
Assorted Links links
Published: 2024-10-30
Wednesday 2024-10-30 Assorted Links

Assorted links for Wednesday, October 30:

  1. Finding the Right Data Architecture for RAG Pipelines

    Event streaming is ideal for RAG pipelines that feed generative AI applications the contextual data they need to produce accurate, timely results.

  2. How to Run Databases on Kubernetes: An 8-Step Guide
  3. AI Code Assistants Are Moving Beyond Auto-Complete: Here’s What’s Next
  4. Rustls Outperforms OpenSSL and BoringSSL: Is there something intrinsic to Rust, or is this an artifact of more time spent on optimization?
  5. What is zero trust authorization?: This doesn’t seem novel to me – it seems obvious and is how I’ve architected software for 15+ years.

    Never trust, always verify: The ZTA model presumes that no entity—be it a user, device, or software—warrants automatic confidence, irrespective of their physical position or historical clearance levels. Each request for entry must undergo scrutiny.

Monday 2024-10-28 Assorted Links
Assorted Links links
Published: 2024-10-28
Monday 2024-10-28 Assorted Links

Assorted links for Monday, October 28:

  1. IPLS: Privacy-preserving storage for your WhatsApp contacts
  2. New discovery reveals how diatoms capture CO2 so effectively
  3. What Color is Your Function?
  4. Angular’s Approach to Partial Hydration

    Rather than fully hydrate the application immediately, partial hydration allows developers to identify portions of their application — maybe a footer or something that a user will not immediately need to see — and rather than ship all of the JavaScript in the app, it “hydrates” only the parts that are needed immediately.

  5. AWS Welcomes the OpenSearch Software Foundation

    OpenSearch, the popular open source, Apache 2.0-licensed, search and analytics suite, is celebrating a significant milestone - transferring OpenSearch to the OpenSearch Software Foundation, a community-driven initiative under the Linux Foundation.

Thursday 2024-10-24 Assorted Links
Assorted Links links
Published: 2024-10-24
Thursday 2024-10-24 Assorted Links

Assorted links for Thursday, October 24:

  1. Safer with Google: Advancing Memory Safety
  2. Announcing Rust 1.82.0
  3. AWS Makes ETL Disappear for Aurora PostgreSQL, DynamoDB

    This week, Amazon Web Services introduced new integrations with its Amazon Aurora PostgreSQL and Amazon DynamoDB database management services that allow them to share data with the Amazon Redshift data warehouse services, without the need to set up ETL (Extract, Transform and Load) workflows between them.

  4. Federal Trade Commission Announces Final “Click-to-Cancel” Rule Making It Easier for Consumers to End Recurring Subscriptions and Memberships: Since Loper Bright Enterprises v. Raimondo overturned the Chevron doctrine, I expect this rule to be challenged immediately. Update 2024-10-29: Comcast, Charter Sue FTC Over Efforts To Make Canceling Services Easier
  5. The Architect’s Guide to Interoperability in the AI Data Stack
Wednesday 2024-10-23 Assorted Links
Assorted Links links
Published: 2024-10-23
Wednesday 2024-10-23 Assorted Links

Assorted links for Wednesday, October 23:

  1. Startup can identify deepfake video in real time
  2. Announcing IBM Granite AI Models Now Available on Docker Hub
  3. Graph RAG: How To Squeeze More Value From AI
  4. Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug

    Researchers found a flaw in a Kia web portal that let them track millions of cars, unlock doors, and start engines at will—the latest in a plague of web bugs that’s affected a dozen carmakers.

  5. OpenHCL: the new, open source paravisor

    A paravisor executes within the confidential trust boundary and provides the virtualization and device services needed by a general-purpose operating system (OS), enabling existing VM workloads to execute securely without requiring continual service of the OS to take advantage of innovative advances in confidential computing technology. As confidential computing becomes available on more hardware platforms and evolves, the software stack can keep VMs running seamlessly thanks to the paravisor, in much the same way other advances in virtualization software enabled VMs to run seamlessly on ever evolving hardware.

Tuesday 2024-10-22 Assorted Links
Assorted Links links
Published: 2024-10-22
Tuesday 2024-10-22 Assorted Links

Assorted links for Tuesday, October 22:

  1. What’s new in System.Text.Json in .NET 9

    The 9.0 release of System.Text.Json includes many features, primarily with a focus on JSON schema and intelligent application support. It also includes highly requested enhancements such as nullable reference type support, customizing enum member names, out-of-order metadata deserialization and customizing serialization indentation.

  2. A quick introduction to return address protection technologies
  3. North Korean hackers use newly discovered Linux malware to raid ATMs

    The malware, tracked under the name FASTCash, is a remote access tool that gets installed on payment switches inside compromised networks that handle payment card transactions.

    The purpose of FASTCash is to compromise a key switch inside the complex networks that broker payment transactions among merchants and their banks on the one hand and, on the other, the payment card issuers who must approve a transaction… When a compromised card is used to make a fraudulent translation, FASTCash tampers with the messages the switch receives from issuers before relaying it back to the merchant bank. As a result, issuer messages denying the transaction are changed to approvals.

  4. Building Knowledge Graphs at Production Scale for GenAI
  5. Docker Best Practices: Using ARG and ENV in Your Dockerfiles

    If you need to access a variable during the build process but not at runtime, use ARG. If you need to access the variable both during the build and at runtime, or only at runtime, use ENV.