Feeds I follow
A collection of recent articles from blogs that I follow.
-
Airbnb Brandometer: Powering Brand Perception Measurement on Social Media Data with AI
-
A Promising Methodology for Testing GenAI Applications in Java
Testing applications that incorporate AI can be difficult. In this article, we share a promising new methodology for testing GenAI applications in Java.
-
Earlier this year, we updated our API Guide to let developers know that SoundCloud authentication is now operating on the OAuth 2.1 protocol…
-
How We Built Slack AI To Be Secure and Private
At Slack, we’ve long been conservative technologists. In other words, when we invest in leveraging a new category of infrastructure, we do it rigorously. We’ve done this since we debuted machine learning-powered features in 2016, and we’ve developed a robust process and skilled team in the...
-
The Making of VES: the Cosmos Microservice for Netflix Video Encoding
-
Get started with the latest updates for Dockerfile syntax (v1.7.0)
Dockerfiles are fundamental tools for developers working with Docker, serving as a blueprint for creating Docker images. Learn about new Dockerfile (v1.7.0) capabilities and how you can leverage them in your projects to further optimize your Docker workflows.
-
Watch hundreds of teenagers grow up into adults – and see how their lives turn out
-
Gusto's Gradual Modularization Destination
The path to a well-structured modular monolith passes through one important juncture: Deciding between extractable applications and libraries.
-
Debian’s Dedication to Security: A Robust Foundation for Docker Developers
We outline how and why Debian operates as a secure basis for development and makes a good choice for Docker Official Images.
-
Software engineers have endless opinions about code line length rules. Instead of a rigid numeric limit, consider adopting the delicious fruit-based Banana Rule.
-
OpenSSH and XZ/liblzma: A Nation-State Attack Was Thwarted, What Did We Learn?
Docker CTO Justin Cormack looks at what we can learn from malicious code in upstream tarballs of xz targeted at a subset of OpenSSH servers. "It is hard to overstate how lucky we were here, as there are no tools that will detect this vulnerability."
-
Is Your Container Image Really Distroless?
Find out what makes an image distroless, tools that make the creation of distroless images practical, and security benefits of this approach.