Tue.Apr 09, 2024

article thumbnail

Bringing MegaBlocks to Databricks

databricks

At Databricks, we’re committed to building the most efficient and performant training tools for large-scale AI models. With the recent release of DBRX.

124
124
article thumbnail

Article: InfoQ Culture & Methods Trends Report - April 2024

InfoQ Articles

The Culture and Methods trends report discusses evolving roles within teams, the way the staff plus roles are able to add value, the use and misuse of DevEx metrics, how remote work continues to evolve, a lack of diversity is still a challenge, and the need to move from climate change awareness to climate conscious software engineering By Shane Hastie, Jutta Eckstein, Ben Linders, Susan McIntosh, Rafiq Gemmail, Craig Smith

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why the Slowdown of Kryder’s Law Spells Urgency for Sustainable Archival Storage

Dataversity

Kryder’s Law, named after Mark Kryder – the former SVP of research at Seagate Technology – is an observation comparable to Moore’s Law but specifically related to the area of magnetic disk storage. It posits that the density of information stored on magnetic disks is increasing exponentially, doubling approximately every 18 months. Kryder’s Law, much like Moore’s […] The post Why the Slowdown of Kryder’s Law Spells Urgency for Sustainable Archival Storage appeared first on DATAVERSITY.

article thumbnail

PP009: Don’t Forget the Firmware

Packet Pushers

If your approach to firmware is that you dont bother it as long as it doesnt bother you, you might want to listen to this episode. Concerns about supply chain vulnerabilities are on the rise and for good reason: Attackers are targeting firmware because compromising this software can allow attackers to persist on systems after. Read more » If your approach to firmware is that you dont bother it as long as it doesnt bother you, you might want to listen to this episode.

52
article thumbnail

How to Perform a Network Audit: Uncovering the Secrets of Your Network

Obkio

Learn how to perform a network audit (network performance audit) to uncover issues before they cause havoc. Uncover Obkio's Network Audit Tool.

article thumbnail

From Idle to Established: BGP states, BGP ports and TCP interactions

Noction

Understanding BGP states is essential to grasp how BGP operates. Similar to interior gateway protocols (IGPs) like EIGRP, OSPF, or ISIS, BGP establishes peering with other routers before exchanging routing information.

Port 52
article thumbnail

HS069: Regulating AI

Packet Pushers

In todays episode Greg and Johna spar over how, when, and why to regulate AI. Does early regulation lead to bad regulation? Does late regulation lead to a situation beyond democratic control? Comparing nascent regulation efforts in the EU, UK, and US, they analyze socio-legal principles like privacy and distributed liability. Most importantly, Johna drives.

52