Article: Functional UI - a Model-Based Approach
6 hours ago, infoq

Functional UI techniques rely on the functional relation between events processed by the user interface and the actions performed by the interface. If the user interface has discrete modes in which its behavior can be expressed simply, a modelization with state machines is an advantageous functional UI technique. This article explains the technique, its benefits and how it is used in the industry. By Bruno Couriol...

Percona Monitoring and Management, Meet Prometheus Alertmanger
22 hours ago, percona

One of the requests we get most often on the Percona Monitoring and Management (PMM) team is “Do you support alerting?”  The answer to that question has always been “Yes” but the feedback on how we offered it natively was that it was, well, not robust enough!  We’ve been hard at work to change that […]...

Percona Monitoring and Management, Meet Prometheus Alertmanager
22 hours ago, percona

One of the requests we get most often on the Percona Monitoring and Management (PMM) team is “Do you support alerting?”  The answer to that question has always been “Yes” but the feedback on how we offered it natively was that it was, well, not robust enough!  We’ve been hard at work to change that […]...

Setting Fairness Goals with the TensorFlow Constrained Optimization Library
1 day ago, googleresearch

Posted by Andrew Zaldivar, Responsible AI Advocate, Google Research, on behalf of the TFCO Team Many technologies that use supervised machine learning are having an increasingly positive impact on peoples’ day-to-day lives, from catching early signs of illnesses to filtering inappropriate content. There is, however, a growing concern that learned models, which generally satisfy the narrow requirement of minimizing a single loss function, may have difficulty addressing broader societal issues suc...

[$] CAP_PERFMON — and new capabilities in general
1 day ago, lwn

The perf_event_open() system call is a complicated beast, requiring a fair amount of study to master. This call also has some interesting security implications: it can be used to obtain a lot of information about the running system, and the complexity of the underlying implementation has made it more than usually prone to unpleasant bugs. In current kernels, the security controls around perf_event_open() are simple, though: if you have the CAP_SYS_ADMIN capability, perf_event_open() is availab...

OKD4 Update and Roadmap with Christian Glombek
1 day ago, openshift

In case you were wondering what’s going on with OKD, Red Hat’s Christian Glombek delivered an update on the project, its current state and its roadmap. Here’s the full talk in video form. The post OKD4 Update and Roadmap with Christian Glombek appeared first on Red Hat OpenShift Blog....

Using your devices as the key to your apps
1 day ago, cloudflare

I keep a very detailed budget. I have for the last 7 years. I manually input every expense into a spreadsheet app and use a combination of sumifs functions to track spending....

Your ML workloads cheaper and faster with the latest GPUs
1 day ago, googlecloud

Running ML workloads more cost effectivelyGoogle Cloud wants to help you run your ML workloads as efficiently as possible. To do this, we offer many options for accelerating ML training and prediction, including many types of NVIDIA GPUs. This flexibility is designed to let you get the right tradeoff between cost and throughput during training or cost and latency for prediction.We recently reduced the price of NVIDIA T4 GPUs, making AI acceleration even more affordable. In this post, we’ll revis...

Porting a Go Face-Detection Library to Wasm - Q&A with Endre Simo
1 day ago, infoq

Endre Simo, senior software developer and open-source contributor to a few popular image-processing projects, ported the Pigo face-detection library from Go to browsers with WebAssembly. The port illustrates the performance potential of WebAssembly today to run heavy-weight desktop applications in a browser context. By Bruno Couriol...

Getting Edgy: Fundamentals of Canary Releasing
1 day ago, ambassador

In today’s episode of Getting Edgy, Daniel Bryant talks about the fundamentals of canary releasing.In a canary release, you divert a small amount of traffic (1%) to a new version of a service while still routing the rest of the traffic (99%) to the old service. This strategy allows you to observe how the upgrade will affect KPIs or how it will operationally stand up to a full workload with minimal impact to your users.In order for a canary release to be successful, it’s critical that you are abl...

Podcast: Brittany Postnikoff on Security, Privacy, and Social Engineering with Robots
1 day ago, infoq

Daniel Bryant sat down with Brittany Postnikoff, a computer systems analyst specialising on the topics of robotics, embedded systems, and human-robot interaction. Topics discussed included: the rise of robotics and human-robot interaction within modern life, the security and privacy risks of robots used within this context, and the potential for robots to be used to socially engineer people. By Brittany Postnikoff...

Article: Software, Aesthetics, and Craft: How Java, Lisp, and Agile Shape and Reflect Their Culture
1 day ago, infoq

The software industry styles itself on architecture and construction, but rarely discusses aesthetics. By Ian Miell...

How To Build A Simple Cryptocurrency Blockchain In Node.js
1 day ago, smashingmagazine

The unprecedented rise of cryptocurrencies, and their underpinning blockchain technology, have taken the world by storm — from the humble beginnings of being an academic concept over a decade ago to current increased adoption in various industries. The blockchain technology is receiving a lot of attention because of its ability to enhance security in trustless environments, enforce decentralization, and make processes efficient. Traditionally, Python has been the de facto programming langu...

Algorithmia Adds GitHub Integration to Machine Learning Platform
1 day ago, infoq

Algorithmia, an AI model management automation platform for data scientists and machine learning (ML) engineers, now integrates with GitHub. By Helen Beal...

Designing an event-driven process at scale: Part 3
1 day ago, redhat

In the first article in this series, Designing an event-driven business process at scale: A health management example, Part 1, you found the business use case and data model for a concrete example from the health management industry. You then began implementing the example in jBPM (an open source business automation suite) by creating the Trigger […] The post Designing an event-driven process at scale: Part 3 appeared first on Red Hat Developer....

Analyzing anomalies with ThirdEye
1 day ago, linkedin

Co-authors: Yen-Jung Chang, Yang Yang, Xiaohui Sun, and Tie Wang At LinkedIn, ThirdEye is the backbone of our monitoring toolkit. We use it to keep track of a variety of metrics, whether it be related to production infrastructure and AI model performance, or business impact, such as page view or click count. It’s a key quality assurance system because it provides rules-based or model-based anomaly detection to reduce false alarms, and multiple interactive root cause analysis tools to help our en...

Next