I’m wiped after a busy day; it’s the 1:1 conversations that really do it to me. I’m an introvert, so it takes extra effort to dial up the listening, engaging, and emoting. Worth it, but exhausting. My “relaxation” time often involves stealing a couple minutes to read the items below.
[article] Meta’s new LLM-based test generator is a sneak peek to the future of development. Here’s a review of a paper from Meta about using LLMs to generate code improvements without regression and improve upon human-written tests.
[blog] Gemma, Ollama and LangChainGo. I’ve seen a lot of experiments with Gemma. Here, Eli shows how straightforward it is to run locally on your machine.
[guide] Infrastructure for a RAG-capable generative AI application using Vertex AI. This is an excellent new reference guide for a generative AI architecture consisting of data ingest, serving, and quality evaluation components.
[article] How Netflix Really Uses Java. The presentation and transcript includes lots of details about what’s running at Netflix, their key tech choices, and what they’re excited about.
[blog] Monitoring your latest app release just got easier. If you’re like me, you have very little patience for finicky mobile apps. This new Firebase dashboard lets you see key metrics in real-time after a release, which means you can fix things faster, and keep users happier.
[article] Periodic Face-to-Face. Martin Fowler says that even remote-first teams need face to face time to build trust, uncover ideas, and confirm direction.
[blog] The story of Google Nest’s migration to Cloud SQL on Google Cloud. Sometimes you switch cloud provider because an acquiring company asks you to! This is Nest’s story of moving self-managed data to a managed service in Google Cloud.
[blog] India’s bloated IT services firms must learn from their startups to avoid GenAI meltdown. Generative AI represents a fundamental change that I services firms need to adjust to. This piece has some frank advice.
[blog] How to prevent lateral movement techniques on Google Cloud. You don’t want attackers navigating across the network to find vulnerable resources. This post explores recent research from Palo Alto Networks, and how to avoid cloud misconfigurations.
##
Want to get this update sent to you every day? Subscribe to my RSS feed or subscribe via email below:
One thought